Limit search to available items
Book Cover
E-book
Author International Conference on Network and System Security (6th : 2012 : Wuyishan, China)

Title Network and system security : 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings / Li Xu, Elisa Bertino, Yi Mu (eds.)
Published Heidelberg ; New York : Springer, ©2012

Copies

Description 1 online resource (xiv, 532 pages)
Series Lecture notes in computer science ; 7645
LNCS sublibrary: SL 4, Security and cryptology
Lecture notes in computer science ; 7645.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection / Yuxin Meng and Lam-for Kwok -- On the Automated Analysis of Safety in Usage Control: A New Decidability Result / Silvio Ranise and Alessandro Armando -- Attestation of Mobile Baseband Stacks / Steffen Wagner, Sascha Wessel and Frederic Stumpf -- A Scalable Link Model for Local Optical Wireless Networks / Tae-Gyu Lee and Gi-Soo Chung -- Addressing Situational Awareness in Critical Domains of a Smart Grid / Cristina Alcaraz and Javier Lopez -- Identifying OS Kernel Objects for Run-Time Security Analysis / Amani S. Ibrahim, James Hamlyn-Harris, John Grundy and Mohamed Almorsy -- Background Transfer Method for Ubiquitous Computing / Tae-Gyu Lee and Gi-Soo Chung -- Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption / Shengli Liu, Fangguo Zhang and Kefei Chen -- Proxy Signature Scheme Based on Isomorphisms of Polynomials / Shaohua Tang and Lingling Xu -- Universal Designated Verifier Signcryption / Fei Tang, Changlu Lin and Pinhui Ke -- A Bird's Eye View on the I2P Anonymous File-Sharing Environment / Juan Pablo Timpanaro, Isabelle Chrisment and Olivier Festor
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data / Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani and Hassan Mahdikhani -- Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity / Alif Wahid, Christopher Leckie and Chenfeng Zhou -- Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks / Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li and Jiaxiang Quan -- An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks / Yifan Zhao, Swee-Won Lo, Robert H. Deng and Xuhua Ding -- The Performance of Public Key-Based Authentication Protocols / Kaiqi Xiong -- Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net / Long-Hai Li, Cheng-Qiang Huang and Shao-Feng Fu -- Resilience Strategies for Networked Malware Detection and Remediation / Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith and Alberto Schaeffer-Filho -- Detecting Spammers via Aggregated Historical Data Set / Eitan Menahem, Rami Pusiz and Yuval Elovici -- Operating System Kernel Data Disambiguation to Support Security Analysis / Amani S. Ibrahim, John Grundy, James Hamlyn-Harris and Mohamed Almorsy
FlexCOS: An Open Smartcard Platform for Research and Education / Kristian Beilke and Volker Roth -- Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games / Willy Susilo, Yang-Wai Chow and Rungrat Wiangsripanawan -- Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques / Łukasz Krzywiecki and Mirosław Kutyłowski -- Practical Certificateless Public Key Encryption in the Standard Model / Wenjie Yang, Futai Zhang and Limin Shen -- (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack / Yunmei Zhang, Man Ho Au, Guomin Yang and Willy Susilo -- Direct CCA Secure Identity-Based Broadcast Encryption / Leyou Zhang, Qing Wu and Yupu Hu -- A Communication Efficient Group Key Distribution Scheme for MANETs / Yang Yang -- Cryptanalysis of Exhaustive Search on Attacking RSA / Mu-En Wu, Raylin Tso and Hung-Min Sun -- On the Improvement of Fermat Factorization / Mu-En Wu, Raylin Tso and Hung-Min Sun -- Impossible Differential Cryptanalysis on Tweaked E2 / Yuechuan Wei, Xiaoyuan Yang, Chao Li and Weidong Du
Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors / Jing Guo and Zhuxiao Wang -- Differential Privacy Data Release through Adding Noise on Average Value / Xilin Zhang, Yingjie Wu and Xiaodong Wang -- Private Friends on a Social Networking Site Operated by an Overly Curious SNP / Roman Schlegel and Duncan S. Wong -- Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks / Sushama Karumanchi, Anna Squicciarini and Dan Lin -- Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture / Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui -- A Secure and Private RFID Authentication Protocol under SLPN Problem / Mohammad S.I. Mamun, Atsuko Miyaji and Mohammad S. Rahman -- Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud / Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia and Zheli Liu -- Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks / Huimin Shuai and Wen Tao Zhu -- Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC) / Nima Mousavi and Mahesh V. Tripunitara
Summary This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control
Analysis computerwetenschappen
computer sciences
informatiesystemen
information systems
elektronische handel
electronic commerce
gegevensbeheer
data management
databasebeheer
database management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer networks -- Security measures -- Congresses
Informatique.
Computer networks -- Security measures.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Xu, Li (Cryptographer)
Bertino, Elisa.
Mu, Yi, 1955-
ISBN 3642346014
9783642346019