Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/nss/nss2015.bht:"
@inproceedings{DBLP:conf/nss/AldribiT15, author = {Abdulaziz Aldribi and Issa Traor{\'{e}}}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {A Game Theoretic Framework for Cloud Security Transparency}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {488--500}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_37}, doi = {10.1007/978-3-319-25645-0\_37}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/AldribiT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/AtenieseHMVV15, author = {Giuseppe Ateniese and Briland Hitaj and Luigi Vincenzo Mancini and Nino Vincenzo Verde and Antonio Villani}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {46--59}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_4}, doi = {10.1007/978-3-319-25645-0\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/AtenieseHMVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BaliosianC15, author = {Javier Baliosian and Ana R. Cavalli}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {An Abstraction for the Interoperability Analysis of Security Policies}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {418--427}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_30}, doi = {10.1007/978-3-319-25645-0\_30}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/BaliosianC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BortolameottiPE15, author = {Riccardo Bortolameotti and Andreas Peter and Maarten H. Everts and Damiano Bolzoni}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Indicators of Malicious {SSL} Connections}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {162--175}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_11}, doi = {10.1007/978-3-319-25645-0\_11}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/BortolameottiPE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BukacSNRM15, author = {Vit Bukac and Vlasta Stavova and Lukas Nemec and Zdenek R{\'{\i}}ha and Vashek Matyas}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Service in Denial - Clouds Going with the Winds}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {130--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_9}, doi = {10.1007/978-3-319-25645-0\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/BukacSNRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/CaiV15, author = {Hang Cai and Krishna K. Venkatasubramanian}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Detecting Malicious Temporal Alterations of {ECG} Signals in Body Sensor Networks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {531--539}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_41}, doi = {10.1007/978-3-319-25645-0\_41}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/CaiV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/CallegariGP15, author = {Christian Callegari and Stefano Giordano and Michele Pagano}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {439--446}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_32}, doi = {10.1007/978-3-319-25645-0\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/CallegariGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ChenMSZ15, author = {Jiageng Chen and Atsuko Miyaji and Chunhua Su and Liang Zhao}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {A New Statistical Approach for Integral Attack}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {345--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_23}, doi = {10.1007/978-3-319-25645-0\_23}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ChenMSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/CioranescoHAC15, author = {Jean{-}Michel Cioranesco and Craig Hampel and Guilherme Ozari de Almeida and Rodrigo Portella do Canto}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Cryptographically Secure On-Chip Firewalling}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {428--438}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_31}, doi = {10.1007/978-3-319-25645-0\_31}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/CioranescoHAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/CrescenzoME15, author = {Giovanni Di Crescenzo and Ronald Menendez and Shahab Etemad}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Foundations of Optical Encryption: {A} Candidate Short-Key Scheme}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {359--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_24}, doi = {10.1007/978-3-319-25645-0\_24}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/CrescenzoME15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/FioravantiSZ15, author = {Mark E. Fioravanti II and Ayush Shah and Shengzhi Zhang}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {A Study of Network Domains Used in Android Applications}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {467--474}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_35}, doi = {10.1007/978-3-319-25645-0\_35}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/FioravantiSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/GeganAFG15, author = {Ross K. Gegan and Rennie Archibald and Matthew K. Farrens and Dipak Ghosal}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {519--530}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_40}, doi = {10.1007/978-3-319-25645-0\_40}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/GeganAFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HabibiP0B15, author = {Javid Habibi and Ajay Panicker and Aditi Gupta and Elisa Bertino}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {112--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_8}, doi = {10.1007/978-3-319-25645-0\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/HabibiP0B15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/JainC15, author = {Ashish Jain and Narendra S. Chaudhari}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to {DPA} Attacks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {316--330}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_21}, doi = {10.1007/978-3-319-25645-0\_21}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/JainC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/JoverMB15, author = {Roger Piqueras Jover and Ilona Murynets and Jeffrey Bickford}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Detecting Malicious Activity on Smartphones Using Sensor Measurements}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {475--487}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_36}, doi = {10.1007/978-3-319-25645-0\_36}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/JoverMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KadirSG15, author = {Andi Fitriah Abdul Kadir and Natalia Stakhanova and Ali Akbar Ghorbani}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Android Botnets: What URLs are Telling Us}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {78--91}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_6}, doi = {10.1007/978-3-319-25645-0\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KadirSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KluczniakHKK15, author = {Kamil Kluczniak and Lucjan Hanzlik and Przemyslaw Kubiak and Miroslaw Kutylowski}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Anonymous Evaluation System}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {283--299}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_19}, doi = {10.1007/978-3-319-25645-0\_19}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KluczniakHKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KrishnanS15, author = {P. Krishnan and Navjot Singh}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {{VICI:} Visual Caller Identification for Contact Center Applications}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {511--518}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_39}, doi = {10.1007/978-3-319-25645-0\_39}, timestamp = {Fri, 22 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KrishnanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiP15, author = {Chao Li and Balaji Palanisamy}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {449--458}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_33}, doi = {10.1007/978-3-319-25645-0\_33}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/LiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaQ15, author = {Xiaoshuang Ma and Kexin Qiao}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {331--344}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_22}, doi = {10.1007/978-3-319-25645-0\_22}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/MaQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaZ15, author = {Hui Ma and Rui Zhang}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {254--267}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_17}, doi = {10.1007/978-3-319-25645-0\_17}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MaZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MansorMAM15, author = {Hafizah Mansor and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Let's Get Mobile: Secure {FOTA} for Automotive System}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {503--510}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_38}, doi = {10.1007/978-3-319-25645-0\_38}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MansorMAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Meng15, author = {Weizhi Meng}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {RouteMap: {A} Route and Map Based Graphical Password Scheme for Better Multiple Password Memory}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {147--161}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_10}, doi = {10.1007/978-3-319-25645-0\_10}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/Meng15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MiyajiN15, author = {Atsuko Miyaji and Shohei Nishida}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {A Scalable Multiparty Private Set Intersection}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {376--385}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_26}, doi = {10.1007/978-3-319-25645-0\_26}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MiyajiN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/PustchiS15, author = {Navid Pustchi and Ravi S. Sandhu}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {{MT-ABAC:} {A} Multi-Tenant Attribute-Based Access Control Model with Tenant Trust}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {206--220}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_14}, doi = {10.1007/978-3-319-25645-0\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/PustchiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/RicksT15, author = {Brian Ricks and Patrick Tague}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Isolation of Multiple Anonymous Attackers in Mobile Networks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {32--45}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_3}, doi = {10.1007/978-3-319-25645-0\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/RicksT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ShilaVP15, author = {Devu Manikantan Shila and Vivek Venugopalan and Cameron D. Patterson}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Unraveling the Security Puzzle: {A} Distributed Framework to Build Trust in FPGAs}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {95--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_7}, doi = {10.1007/978-3-319-25645-0\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ShilaVP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SinghSAVY15, author = {Mahendra Pratap Singh and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya and Ussama Yakub}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {221--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_15}, doi = {10.1007/978-3-319-25645-0\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/SinghSAVY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Suarez-TangilTP15, author = {Guillermo Suarez{-}Tangil and Juan E. Tapiador and Pedro Peris{-}Lopez}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Compartmentation Policies for Android Apps: {A} Combinatorial Optimization Approach}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {63--77}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_5}, doi = {10.1007/978-3-319-25645-0\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Suarez-TangilTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/VaidyaSAL15, author = {Jaideep Vaidya and Basit Shafiq and Vijayalakshmi Atluri and David Lorenzi}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {A Framework for Policy Similarity Evaluation and Migration Based on Change Detection}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {191--205}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_13}, doi = {10.1007/978-3-319-25645-0\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/VaidyaSAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WanDL15, author = {Zhiguo Wan and Robert H. Deng and David Lee}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Electronic Contract Signing Without Using Trusted Third Party}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {386--394}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_27}, doi = {10.1007/978-3-319-25645-0\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WanDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangIB15, author = {Wei Wang and Mikhail Istomin and Jeffrey Bickford}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {3--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_1}, doi = {10.1007/978-3-319-25645-0\_1}, timestamp = {Thu, 23 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WangIB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangWL15, author = {Fuqun Wang and Kunpeng Wang and Bao Li}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {An Efficient Leveled Identity-Based {FHE}}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {303--315}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_20}, doi = {10.1007/978-3-319-25645-0\_20}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WangWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WilsonA15, author = {Duane Wilson and Giuseppe Ateniese}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {From Pretty Good to Great: Enhancing {PGP} Using Bitcoin and the Blockchain}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {368--375}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_25}, doi = {10.1007/978-3-319-25645-0\_25}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WilsonA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WonB15, author = {Jongho Won and Elisa Bertino}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {18--31}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_2}, doi = {10.1007/978-3-319-25645-0\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WonB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WuG15, author = {Teng Wu and Guang Gong}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {New Message Authentication Code Based on {APN} Functions and Stream Ciphers}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {395--402}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_28}, doi = {10.1007/978-3-319-25645-0\_28}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WuG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/XuH15, author = {Jinwei Xu and Jiankun Hu}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {176--187}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_12}, doi = {10.1007/978-3-319-25645-0\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/XuH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/XuLW15, author = {Li Xu and Limei Lin and Sheng Wen}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {459--466}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_34}, doi = {10.1007/978-3-319-25645-0\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/XuLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Zhang0Q15, author = {Jinsheng Zhang and Wensheng Zhang and Daji Qiao}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {{GP-ORAM:} {A} Generalized Partition {ORAM}}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {268--282}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_18}, doi = {10.1007/978-3-319-25645-0\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Zhang0Q15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangZOCEJ15, author = {Su Zhang and Xinwen Zhang and Xinming Ou and Liqun Chen and Nigel Edwards and Jing Jin}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Assessing Attack Surface with Component-Based Package Dependency}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {405--417}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_29}, doi = {10.1007/978-3-319-25645-0\_29}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangZOCEJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhengLA15, author = {Qingji Zheng and Xiangxue Li and Aytac Azgin}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {{CLKS:} Certificateless Keyword Search on Encrypted Data}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {239--253}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_16}, doi = {10.1007/978-3-319-25645-0\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhengLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2015, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0}, doi = {10.1007/978-3-319-25645-0}, isbn = {978-3-319-25644-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.