default search action
10th NSS 2016: Taipei, Taiwan
- Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung:
Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings. Lecture Notes in Computer Science 9955, Springer 2016, ISBN 978-3-319-46297-4
Invited Paper
- Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu:
While Mobile Encounters with Clouds. 3-18
Authentication Mechanism
- Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. 21-36 - Jia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai:
A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism. 37-46 - Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun:
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. 47-61
Cloud Computing Security
- Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jia-Nan Liu:
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. 65-79 - Yi Zhang, Liuhua Chen, Haiying Shen, Xiaohui Cheng:
An Energy-Efficient Task Scheduling Heuristic Algorithm Without Virtual Machine Migration in Real-Time Cloud Environments. 80-97 - Shashank Gupta, Brij Bhooshan Gupta:
An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms. 98-109
Data Mining for Security Application
- Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang:
Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security. 113-125 - Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis:
Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade. 126-139
Digital Signature
- Raylin Tso:
Two-in-One Oblivious Signatures Secure in the Random Oracle Model. 143-155 - Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo:
A New Transitive Signature Scheme. 156-167
Privacy-Preserving Technologies
- Yosuke Ishikuro, Kazumasa Omote:
Privacy-Preserving Profile Matching Protocol Considering Conditions. 171-183 - Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao:
Privacy Preserving Credit Systems. 184-199 - Ishai Rosenberg, Ehud Gudes:
Evading System-Calls Based Intrusion Detection Systems. 200-216
Network Security and Forensic
- Toshihiro Yamauchi, Yuta Ikegami:
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks. 219-234 - Nikolai Hampton, Zubair A. Baig:
Timestamp Analysis for Quality Validation of Network Forensic Data. 235-248
Searchable Encryption
- Tingting Wang, Man Ho Au, Wei Wu:
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. 251-265 - Fangming Zhao, Takashi Nishide:
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards. 266-282 - Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun:
A System of Shareable Keyword Search on Encrypted Data. 283-299
Security Policy and Access Control
- Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
An Attribute-Based Protection Model for JSON Documents. 303-317 - Maanak Gupta, Ravi S. Sandhu:
The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment. 318-332 - Asma Alshehri, Ravi S. Sandhu:
On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A. 333-346
Security Protocols
- Gang Sheng, Chunming Tang, Wei Gao, Ying Yin:
MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication. 349-362 - Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai:
Expressive Rating Scheme by Signatures with Predications on Ratees. 363-379
Symmetric Key Cryptography
- Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam:
A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers. 383-397 - Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. 398-411
System Security
- Qiumao Ma, Wensheng Zhang, Jinsheng Zhang:
DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern. 415-432 - Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip:
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. 433-449 - Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap:
Iris Cancellable Template Generation Based on Indexing-First-One Hashing. 450-463
Web Security
- Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani:
Detecting Malicious URLs Using Lexical Analysis. 467-482 - Bailin Xie, Yu Wang, Chao Chen, Yang Xiang:
Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. 483-496
Data Mining for Security Application (Short Paper)
- Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo:
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. 499-506
Provable Security (Short Paper)
- Kewei Lv, Wenjie Qin, Ke Wang:
Improved Security Proof for Modular Exponentiation Bits. 509-516
Security Protocol (Short Paper)
- Tomasz Hyla, Jerzy Pejas:
Secure Outsourced Bilinear Pairings Computation for Mobile Devices. 519-529 - Fei Xu, Pinxin Liu, Jianfeng Yang, Jing Xu:
The Design and Implementation of Multi-dimensional Bloom Filter Storage Matrix. 530-538
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.