


default search action
8th NSS 2014: Xi'an, China
- Man Ho Au

, Barbara Carminati
, C.-C. Jay Kuo
:
Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings. Lecture Notes in Computer Science 8792, Springer 2014, ISBN 978-3-319-11697-6
Cloud Computing
- Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. 1-14 - Dang Nguyen, Jaehong Park, Ravi S. Sandhu:

Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. 15-27 - Yong Yu

, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang:
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage. 28-40 - Khalid Zaman Bijon, Ram Krishnan

, Ravi S. Sandhu:
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. 41-53
Access Control
- Bo Tang, Ravi S. Sandhu:

Extending OpenStack Access Control with Domain Trust. 54-69 - Shuangyu He, Jianwei Liu, Jian Mao, Jie Chen:

Hierarchical Solution for Access Control and Authentication in Software Defined Networks. 70-81 - Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu:

A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. 82-95
Network Security
- Yi Tang, Piaoping Lin, Zhaokai Luo:

psOBJ: Defending against Traffic Analysis with pseudo-Objects. 96-109 - Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:

Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. 110-123 - Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng:

Revisiting Node Injection of P2P Botnet. 124-137 - Di Wu

, Xiao Chen
, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou
:
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. 138-151
Security Analysis
- Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry:

Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack. 152-165 - Yonglin Hao, Dongxia Bai, Leibo Li:

A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique. 166-183 - Jiageng Chen

, Yuichi Futa, Atsuko Miyaji
, Chunhua Su:
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. 184-197 - Xiutao Feng, Fan Zhang:

Cryptanalysis on the Authenticated Cipher Sablier. 198-208 - Yumei Li, Holger Voos

, Albert Rosich
, Mohamed Darouach:
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. 209-222 - Chien-Ming Chen

, Tsu-Yang Wu
, Raylin Tso, Mu-En Wu:
Security Analysis and Improvement of Femtocell Access Control. 223-232
Public Key Cryptography
- Baodian Wei, Yusong Du, Huang Zhang

, Fangguo Zhang
, Haibo Tian, Chong-zhi Gao:
Identity Based Threshold Ring Signature from Lattices. 233-245 - Shuquan Hou, Xinyi Huang, Li Xu:

Identity-Based Transitive Signcryption. 246-259 - Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu:

GO-ABE: Group-Oriented Attribute-Based Encryption. 260-270 - Ibrahim F. Elashry, Yi Mu, Willy Susilo

:
Jhanwar-Barua's Identity-Based Encryption Revisited. 271-284 - Vandana Guleria, Ratna Dutta:

Lightweight Universally Composable Adaptive Oblivious Transfer. 285-298 - Jiguo Li, Xuexia Zhao, Yichen Zhang:

Certificate-Based Conditional Proxy Re-Encryption. 299-310 - Xiao Feng, Zheng Yuan:

A Secure Obfuscator for Encrypted Blind Signature Functionality. 311-322 - Weiwei Liu, Yi Mu, Guomin Yang

:
Attribute-Based Signing Right Delegation. 323-334
System Security
- Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider

, Zhe Xia:
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. 335-348 - Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu:

iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. 349-362 - N. Rajamanickam, R. Nadarajan, Atilla Elçi:

Formal Verification of Finite State Transactional Security Policy. 363-376
Privacy-Preserving Systems and Bio-metrics
- Wei Zhou, Jiankun Hu

, Song Wang
, Ian R. Petersen, Mohammed Bennamoun
:
Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features. 377-388 - Hasini Gunasinghe, Elisa Bertino:

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. 389-408 - Yamin Wen, Zheng Gong:

A Dynamic Matching Secret Handshake Scheme without Random Oracles. 409-420 - Li Xi, Dengguo Feng:

Formal Analysis of DAA-Related APIs in TPM 2.0. 421-434
Key Management and Distribution
- Tapas Pandit, Rana Barua, Somanath Tripathy:

eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy. 435-447 - Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. 448-461 - Mengmeng Ge, Kim-Kwang Raymond Choo:

A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. 462-475
Short Papers
- Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu:

Rational Secure Two-party Computation in Social Cloud. 476-483 - Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca

, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. 484-492 - Khoa Nguyen, Dat Tran

, Wanli Ma, Dharmendra Sharma
:
A Proposed Approach to Compound File Fragment Identification. 493-500 - Nathalie Baracaldo

, Balaji Palanisamy, James B. D. Joshi:
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. 501-509 - Khoa Nguyen, Dat Tran

, Wanli Ma, Dharmendra Sharma
:
A New Approach to Executable File Fragment Detection in Network Forensics. 510-517 - Xiaoshuang Ma, Lei Hu, Siwei Sun

, Kexin Qiao
, Jinyong Shan
:
Tighter Security Bound of MIBS Block Cipher against Differential Attack. 518-525 - Jingwan Zhang, Yiming Zhao:

A New Multivariate Based Threshold Ring Signature Scheme. 526-533 - Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong:

Capturing Android Malware Behaviour Using System Flow Graph. 534-541 - Miao Xie, Jiankun Hu

, Xinghuo Yu, Elizabeth Chang
:
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD. 542-549 - Kaibin Huang, Raylin Tso, Yu-Chi Chen

, Wangyu Li, Hung-Min Sun:
A New Public Key Encryption with Equality Test. 550-557 - Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay:

A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers. 558-565 - Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao:

Multi-domain Direct Anonymous Attestation Scheme from Pairings. 566-573

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














