Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings /
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016. The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in to...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2016.
|
Σειρά: | Lecture Notes in Computer Science,
9955 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited paper
- While Mobile Encounters with Clouds
- Authentication Mechanism
- Multi-Device Anonymous Authentication
- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism
- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications
- Cloud Computing Security
- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing
- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments
- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms
- Data Mining for Security Application
- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security
- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade
- Digital Signature
- Two-in-One Oblivious Signatures Secure in the Random Oracle Model
- A New Transitive Signature Scheme
- Privacy-preserving Technologies
- Privacy-Preserving Profile Matching Protocol Considering Conditions
- Privacy Preserving Credit Systems
- Evading System-Calls Based Intrusion Detection Systems
- Network Security and Forensic
- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks
- A Network Timestamp Verification Mechanism for Forensic Analysis
- Searchable Encryption
- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords
- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards
- A System of Shareable Keyword Search on Encrypted Data
- Security Policy and Access Control
- An Attribute Based Protection Model for JSON Documents
- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA
- Security Protocols
- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
- Expressive Rating Scheme by Signatures with Predications on Ratees
- Symmetric Key Cryptography
- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers
- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR
- System Security
- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern
- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks
- Iris Cancellable Template Generation based on Indexing-First-One Hashing
- Web Security
- Detecting Malicious URLs Using Lexical Analysis
- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo
- Data Mining for Security Application (Short Paper)
- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining
- Provable Seucirty (Short Paper)
- Improved Security Proofs for Modular Exponentiation Bits
- Security Protocol (Short Paper)
- Secure Outsourced Bilinear Pairings Computation for Mobile Devices
- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.