Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings /

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 init...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Liu, Joseph K. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Huang, Xinyi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Security and Cryptology ; 11928
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Papers
  • Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks
  • Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation
  • Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey
  • A Graph Database-based Approach to Analyze Network Log Files
  • Full Papers
  • A Privacy-Enhancing Framework for Internet of Things Services
  • Using Audio Characteristics for Mobile Device Authentication
  • Ethereum Analysis via Node Clustering
  • Strong Known Related-Key Attacks and the Security of ECDSA
  • Threat Assessment of Enterprise Applications via Graphical Modelling
  • A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing
  • Towards Secure Open Banking Architecture: An Evaluation with OWASP
  • OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms
  • OVERSCAN: OAuth 2.0 Scanner for Missing Parameters
  • LaT-Voting: Traceable Anonymous E-Voting on Blockchain
  • Distributed Secure Storage System Based on Blockchain and TPA
  • SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique
  • A Practical Dynamic Enhanced BFT protocol
  • Pre-adjustment Based Anti-collusion Mechanism for Audio Signals
  • Detecting Intruders by User File Access Patterns
  • Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture
  • Privacy Preserving Machine Learning with Limited Information Leakage
  • Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained
  • Sequential Aggregate MACs with Detecting Functionality Revisited
  • A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System
  • EEG-based Authentication with Variational Universal Background Model
  • An Efficient Vulnerability Detection Model for Ethereum Smart Contracts
  • A Comparative Study on Network Traffic Clustering
  • Tell Them From Me: an Encrypted Application Profiler
  • Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP
  • Gnocchi: Multiplexed Payment Channels for Cryptocurrencies
  • Difficulty of decentralized structure due to rational user behavior on Blockchain
  • A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration
  • Cryptanalysis of Raindrop and FBC
  • Attribute Based Encryption with Publicly Verifiable Outsourced Decryption
  • New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost
  • Lattice based verifiably encrypted double authentication preventing Signatures
  • Privacy-Preserving Sequential Data Publishing
  • A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter
  • Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks
  • SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform
  • Short Papers
  • An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol
  • Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices
  • Privacy-preserving k-means clustering: an application to driving style Recognition
  • Derandomized PACE with Mutual Authentication
  • A Muti-attributes-based Trust Model of Internet of Vehicle
  • Using Sparse Composite Document Vectors to Classify VBA Macros
  • A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications.