


default search action
7th NSS 2013: Madrid, Spain
- Javier López, Xinyi Huang, Ravi S. Sandhu:

Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lecture Notes in Computer Science 7873, Springer 2013, ISBN 978-3-642-38630-5
NSS 2013 Regular Papers
- Rafael Rodríguez-Gómez

, Gabriel Maciá-Fernández
, Pedro García-Teodoro:
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study. 1-13 - Fudong Li, Nathan L. Clarke

, Steven Furnell
:
A Technology Independent Security Gateway for Real-Time Multimedia Communication. 14-25 - Y. Sreenivasa Rao

, Ratna Dutta:
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network. 26-39 - Yuxin Meng

, Wenjuan Li
, Lam-for Kwok
:
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. 40-53 - Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi:

Model the Influence of Sybil Nodes in P2P Botnets. 54-67 - Mahdi Aiash:

A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture. 68-79 - Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang

, Johann Vincent, Laurent Miralabé:
The OffPAD: Requirements and Usage. 80-93 - Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini

, Elisa Bertino:
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. 94-108 - Christoph Krauß

, Volker Fusenig:
Using Trusted Platform Modules for Location Assurance in Cloud Networking. 109-121 - Harsha K. Kalutarage

, Siraj A. Shaikh
, Qin Zhou
, Anne E. James
:
Tracing Sources of Anonymous Slow Suspicious Activities. 122-134 - James Kirrage, Asiri Rathnayake, Hayo Thielecke:

Static Analysis for Regular Expression Denial-of-Service Attacks. 135-148 - Gabriel Cartier, Jean-François Cartier, José M. Fernandez

:
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding. 149-163 - Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias:

Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. 164-177 - Borja Sanz

, Igor Santos
, Javier Nieves, Carlos Laorden
, Iñigo Alonso-Gonzalez, Pablo García Bringas
:
MADS: Malicious Android Applications Detection through String Analysis. 178-191 - Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert:

X-TIER: Kernel Module Injection. 192-205 - Jonas Pfoh, Christian A. Schneider, Claudia Eckert:

Leveraging String Kernels for Malware Detection. 206-219 - Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis:

Insiders Trapped in the Mirror Reveal Themselves in Social Media. 220-235 - George Stergiopoulos

, Bill Tsoumas, Dimitris Gritzalis:
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. 236-249 - Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis

:
Using the Smart Card Web Server in Secure Branchless Banking. 250-263 - Maurizio Naldi

, Marta Flamini
, Giuseppe D'Acquisto:
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach. 264-277 - Giovanni Di Crescenzo, Jim Burns, Brian A. Coan, John L. Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright:

Efficient and Private Three-Party Publish/Subscribe. 278-292 - Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:

Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. 293-306 - Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang:

Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform. 307-320 - Suaad S. Alarifi

, Stephen D. Wolthusen:
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. 321-335 - Benoît Bertholon, Sébastien Varrette, Pascal Bouvry

:
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms. 336-349 - Jiguo Li, Yanqiong Li, Yichen Zhang:

Forward Secure Certificateless Proxy Signature Scheme. 350-364 - Hongda Li, Qihua Niu, Bei Liang:

Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. 365-380 - Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang:

On the Security of an Efficient Attribute-Based Signature. 381-392 - Yao Lu, Rui Zhang, Dongdai Lin:

Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. 393-404 - Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:

Performance Prediction Model for Block Ciphers on GPU Architectures. 405-423 - Yang Wang, Man Ho Au

, Joseph K. Liu
, Tsz Hon Yuen
, Willy Susilo
:
Threshold-Oriented Optimistic Fair Exchange. 424-438 - Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan:

Secure Storage and Fuzzy Query over Encrypted Databases. 439-450 - Yunhui Zhuang, Anjia Yang

, Duncan S. Wong, Guomin Yang
, Qi Xie:
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. 451-464 - Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann:

Privacy Preserving Context Aware Publish Subscribe Systems. 465-478 - Anjia Yang

, Yunhui Zhuang, Duncan S. Wong, Guomin Yang
:
A New Unpredictability-Based RFID Privacy Model. 479-492 - Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:

Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption. 493-506 - Weijia Wang, Lei Hu, Yong Li:

Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting. 507-520 - Jianwei Liu

, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu:
Light Weight Network Coding Based Key Distribution Scheme for MANETs. 521-534 - Chao Wang, Kefei Mao, Jianwei Liu

, Jianhua Liu:
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network. 535-548 - Shaohua Tang, Lingling Xu:

Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. 549-562 - Elisavet Konstantinou:

An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks. 563-574
NSS 2013 Short Papers
- Xu Huang, Salahiddin Altahat, Dat Tran

, Shutao Li:
Human Identification with Electroencephalogram (EEG) for the Future Network Security. 575-581 - Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:

Building Better Unsupervised Anomaly Detector with S-Transform. 582-589 - Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang

:
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. 590-598 - Kannan Karthik:

Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens. 599-606 - James Alderman, Jason Crampton:

On the Use of Key Assignment Schemes in Authentication Protocols. 607-613 - Idalides J. Vergara-Laurens, Diego Mendez-Chaves

, Miguel A. Labrador:
On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems. 614-620 - Ahmad Alomari:

Security Authentication of AODV Protocols in MANETs. 621-627 - Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig:

Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. 628-634 - Qiang Tang:

Towards a Privacy-Preserving Solution for OSNs. 635-641 - Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng:

Measuring and Comparing the Protection Quality in Different Operating Systems. 642-648 - Julien Bringer, Hervé Chabanne, Alain Patey:

Collusion-Resistant Domain-Specific Pseudonymous Signatures. 649-655 - Raphael Spreitzer

, Thomas Plos:
On the Applicability of Time-Driven Cache Attacks on Mobile Devices. 656-662 - Fan Zhang, Hua Guo, Zhoujun Li:

Ancestor Excludable Hierarchical ID-Based Encryption Revisited. 663-670 - Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng

:
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. 671-677 - Jia Hu, Hui Lin, Li Xu:

A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. 678-684 - Jörg Daubert, Mathias Fischer, Stefan Schiffner, Max Mühlhäuser

:
Distributed and Anonymous Publish-Subscribe. 685-691 - Giovanni Agosta

, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. 692-698
NSS 2013 Industrial Track Papers
- Shun-Wen Hsiao

, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen:
Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments. 699-706 - Jorge de-la-Peña-Sordo, Igor Santos

, Iker Pastor-López, Pablo García Bringas
:
Filtering Trolling Comments through Collective Classification. 707-713 - Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto:

Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force Attacks. 714-720 - Dheerendra Mishra

, Vinod Kumar
, Sourav Mukhopadhyay:
A Pairing-Free Identity Based Authentication Framework for Cloud Computing. 721-727 - Alessandro Armando

, Roberto Carbone
, Luca Zanetti:
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols. 728-734 - Jason Cohen, Subatra Acharya:

Towards a More Secure Apache Hadoop HDFS Infrastructure - Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures. 735-741 - Mahdi Aiash:

A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR. 742-748 - Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino:

A Comprehensive Access Control System for Scientific Applications. 749-755 - Wei Zhou, Jiankun Hu

, Ian R. Petersen, Mohammed Bennamoun
:
Partial Fingerprint Reconstruction with Improved Smooth Extension. 756-762 - Sheng Wen

, Yang Xiang
, Wanlei Zhou
:
Modeling and Analysis for Thwarting Worm Propagation in Email Networks. 763-769 - Sana Ullah, Waleed Alsalih:

On Secure and Power-Efficient RFID-Based Wireless Body Area Network. 770-776 - Daniele Midi, Ashish Kundu, Elisa Bertino:

Towards Authenticated Objects. 777-783 - Wencheng Yang, Jiankun Hu

, Song Wang
:
A Finger-Vein Based Cancellable Bio-cryptosystem. 784-790

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














