


default search action
10th NSS 2016: Taipei, Taiwan
- Jiageng Chen

, Vincenzo Piuri, Chunhua Su, Moti Yung:
Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings. Lecture Notes in Computer Science 9955, Springer 2016, ISBN 978-3-319-46297-4
Invited Paper
- Man Ho Au

, Kaitai Liang
, Joseph K. Liu, Rongxing Lu:
While Mobile Encounters with Clouds. 3-18
Authentication Mechanism
- Kamil Kluczniak, Jianfeng Wang

, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. 21-36 - Jia-Ning Luo

, Ming-Hour Yang, Cho-Luen Tsai:
A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism. 37-46 - Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun:

Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. 47-61
Cloud Computing Security
- Kai He, Jian Weng

, Joseph K. Liu, Wanlei Zhou
, Jia-Nan Liu
:
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. 65-79 - Yi Zhang, Liuhua Chen, Haiying Shen, Xiaohui Cheng:

An Energy-Efficient Task Scheduling Heuristic Algorithm Without Virtual Machine Migration in Real-Time Cloud Environments. 80-97 - Shashank Gupta

, Brij Bhooshan Gupta
:
An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms. 98-109
Data Mining for Security Application
- Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang:

Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security. 113-125 - Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis

:
Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade. 126-139
Digital Signature
- Raylin Tso:

Two-in-One Oblivious Signatures Secure in the Random Oracle Model. 143-155 - Chao Lin

, Fei Zhu
, Wei Wu, Kaitai Liang
, Kim-Kwang Raymond Choo
:
A New Transitive Signature Scheme. 156-167
Privacy-Preserving Technologies
- Yosuke Ishikuro, Kazumasa Omote:

Privacy-Preserving Profile Matching Protocol Considering Conditions. 171-183 - Sherman S. M. Chow

, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao
:
Privacy Preserving Credit Systems. 184-199 - Ishai Rosenberg, Ehud Gudes:

Evading System-Calls Based Intrusion Detection Systems. 200-216
Network Security and Forensic
- Toshihiro Yamauchi

, Yuta Ikegami:
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks. 219-234 - Nikolai Hampton, Zubair A. Baig

:
Timestamp Analysis for Quality Validation of Network Forensic Data. 235-248
Searchable Encryption
- Tingting Wang, Man Ho Au

, Wei Wu:
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. 251-265 - Fangming Zhao, Takashi Nishide:

Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards. 266-282 - Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun:

A System of Shareable Keyword Search on Encrypted Data. 283-299
Security Policy and Access Control
- Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan

:
An Attribute-Based Protection Model for JSON Documents. 303-317 - Maanak Gupta, Ravi S. Sandhu:

The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment. 318-332 - Asma Alshehri, Ravi S. Sandhu:

On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A. 333-346
Security Protocols
- Gang Sheng, Chunming Tang, Wei Gao, Ying Yin:

MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication. 349-362 - Hiroaki Anada, Sushmita Ruj

, Kouichi Sakurai:
Expressive Rating Scheme by Signatures with Predications on Ratees. 363-379
Symmetric Key Cryptography
- Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam:

A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers. 383-397 - Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. 398-411
System Security
- Qiumao Ma, Wensheng Zhang, Jinsheng Zhang:

DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern. 415-432 - Wenjuan Li

, Weizhi Meng
, Lam-for Kwok
, Horace Ho-Shing Ip:
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. 433-449 - Yen-Lung Lai, Zhe Jin

, Bok-Min Goi
, Tong-Yuen Chai
, Wun-She Yap
:
Iris Cancellable Template Generation Based on Indexing-First-One Hashing. 450-463
Web Security
- Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari

, Natalia Stakhanova, Ali A. Ghorbani:
Detecting Malicious URLs Using Lexical Analysis. 467-482 - Bailin Xie, Yu Wang

, Chao Chen, Yang Xiang:
Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. 483-496
Data Mining for Security Application (Short Paper)
- Anisur Rahman, Yue Xu

, Kenneth Radke, Ernest Foo
:
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. 499-506
Provable Security (Short Paper)
- Kewei Lv, Wenjie Qin, Ke Wang:

Improved Security Proof for Modular Exponentiation Bits. 509-516
Security Protocol (Short Paper)
- Tomasz Hyla, Jerzy Pejas

:
Secure Outsourced Bilinear Pairings Computation for Mobile Devices. 519-529 - Fei Xu, Pinxin Liu, Jianfeng Yang, Jing Xu:

The Design and Implementation of Multi-dimensional Bloom Filter Storage Matrix. 530-538

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














