Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings /

This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016. The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in to...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Jiageng (Επιμελητής έκδοσης), Piuri, Vincenzo (Επιμελητής έκδοσης), Su, Chunhua (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2016.
Σειρά:Lecture Notes in Computer Science, 9955
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited paper
  • While Mobile Encounters with Clouds
  • Authentication Mechanism
  • Multi-Device Anonymous Authentication
  • A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism
  • Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications
  • Cloud Computing Security
  • Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing
  • An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments
  • An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms
  • Data Mining for Security Application
  • Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security
  • Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade
  • Digital Signature
  • Two-in-One Oblivious Signatures Secure in the Random Oracle Model
  • A New Transitive Signature Scheme
  • Privacy-preserving Technologies
  • Privacy-Preserving Profile Matching Protocol Considering Conditions
  • Privacy Preserving Credit Systems
  • Evading System-Calls Based Intrusion Detection Systems
  • Network Security and Forensic
  • HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks
  • A Network Timestamp Verification Mechanism for Forensic Analysis
  • Searchable Encryption
  • An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords
  • Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards
  • A System of Shareable Keyword Search on Encrypted Data
  • Security Policy and Access Control
  • An Attribute Based Protection Model for JSON Documents
  • The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA
  • Security Protocols
  • MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
  • Expressive Rating Scheme by Signatures with Predications on Ratees
  • Symmetric Key Cryptography
  • A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers
  • Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR
  • System Security
  • DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern
  • PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks
  • Iris Cancellable Template Generation based on Indexing-First-One Hashing
  • Web Security
  • Detecting Malicious URLs Using Lexical Analysis
  • Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo
  • Data Mining for Security Application (Short Paper)
  • Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining
  • Provable Seucirty (Short Paper)
  • Improved Security Proofs for Modular Exponentiation Bits
  • Security Protocol (Short Paper)
  • Secure Outsourced Bilinear Pairings Computation for Mobile Devices
  • The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.