default search action
8th NSS 2014: Xi'an, China
- Man Ho Au, Barbara Carminati, C.-C. Jay Kuo:
Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings. Lecture Notes in Computer Science 8792, Springer 2014, ISBN 978-3-319-11697-6
Cloud Computing
- Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. 1-14 - Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. 15-27 - Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang:
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage. 28-40 - Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. 41-53
Access Control
- Bo Tang, Ravi S. Sandhu:
Extending OpenStack Access Control with Domain Trust. 54-69 - Shuangyu He, Jianwei Liu, Jian Mao, Jie Chen:
Hierarchical Solution for Access Control and Authentication in Software Defined Networks. 70-81 - Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu:
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. 82-95
Network Security
- Yi Tang, Piaoping Lin, Zhaokai Luo:
psOBJ: Defending against Traffic Analysis with pseudo-Objects. 96-109 - Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. 110-123 - Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng:
Revisiting Node Injection of P2P Botnet. 124-137 - Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. 138-151
Security Analysis
- Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry:
Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack. 152-165 - Yonglin Hao, Dongxia Bai, Leibo Li:
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique. 166-183 - Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. 184-197 - Xiutao Feng, Fan Zhang:
Cryptanalysis on the Authenticated Cipher Sablier. 198-208 - Yumei Li, Holger Voos, Albert Rosich, Mohamed Darouach:
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. 209-222 - Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu:
Security Analysis and Improvement of Femtocell Access Control. 223-232
Public Key Cryptography
- Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao:
Identity Based Threshold Ring Signature from Lattices. 233-245 - Shuquan Hou, Xinyi Huang, Li Xu:
Identity-Based Transitive Signcryption. 246-259 - Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu:
GO-ABE: Group-Oriented Attribute-Based Encryption. 260-270 - Ibrahim F. Elashry, Yi Mu, Willy Susilo:
Jhanwar-Barua's Identity-Based Encryption Revisited. 271-284 - Vandana Guleria, Ratna Dutta:
Lightweight Universally Composable Adaptive Oblivious Transfer. 285-298 - Jiguo Li, Xuexia Zhao, Yichen Zhang:
Certificate-Based Conditional Proxy Re-Encryption. 299-310 - Xiao Feng, Zheng Yuan:
A Secure Obfuscator for Encrypted Blind Signature Functionality. 311-322 - Weiwei Liu, Yi Mu, Guomin Yang:
Attribute-Based Signing Right Delegation. 323-334
System Security
- Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia:
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. 335-348 - Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu:
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. 349-362 - N. Rajamanickam, R. Nadarajan, Atilla Elçi:
Formal Verification of Finite State Transactional Security Policy. 363-376
Privacy-Preserving Systems and Bio-metrics
- Wei Zhou, Jiankun Hu, Song Wang, Ian R. Petersen, Mohammed Bennamoun:
Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features. 377-388 - Hasini Gunasinghe, Elisa Bertino:
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. 389-408 - Yamin Wen, Zheng Gong:
A Dynamic Matching Secret Handshake Scheme without Random Oracles. 409-420 - Li Xi, Dengguo Feng:
Formal Analysis of DAA-Related APIs in TPM 2.0. 421-434
Key Management and Distribution
- Tapas Pandit, Rana Barua, Somanath Tripathy:
eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy. 435-447 - Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. 448-461 - Mengmeng Ge, Kim-Kwang Raymond Choo:
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. 462-475
Short Papers
- Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu:
Rational Secure Two-party Computation in Social Cloud. 476-483 - Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. 484-492 - Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma:
A Proposed Approach to Compound File Fragment Identification. 493-500 - Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi:
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. 501-509 - Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma:
A New Approach to Executable File Fragment Detection in Network Forensics. 510-517 - Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan:
Tighter Security Bound of MIBS Block Cipher against Differential Attack. 518-525 - Jingwan Zhang, Yiming Zhao:
A New Multivariate Based Threshold Ring Signature Scheme. 526-533 - Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong:
Capturing Android Malware Behaviour Using System Flow Graph. 534-541 - Miao Xie, Jiankun Hu, Xinghuo Yu, Elizabeth Chang:
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD. 542-549 - Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun:
A New Public Key Encryption with Equality Test. 550-557 - Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay:
A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers. 558-565 - Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao:
Multi-domain Direct Anonymous Attestation Scheme from Pairings. 566-573
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.