buchspektrum Internet-Buchhandlung

Neuerscheinungen 2016

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (Beteiligte)

Network and System Security


10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings
Herausgegeben von Chen, Jiageng; Piuri, Vincenzo; Su, Chunhua; Yung, Moti
1st ed. 2016. 2016. xiv, 540 S. 128 SW-Abb. 235 mm
Verlag/Jahr: SPRINGER, BERLIN; SPRINGER INTERNATIONAL PUBLISHING 2016
ISBN: 3-319-46297-0 (3319462970)
Neue ISBN: 978-3-319-46297-4 (9783319462974)

Preis und Lieferzeit: Bitte klicken


This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016.
The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system security; Web security. The volume also contains one invited paper.
Invited paper.- While Mobile Encounters with Clouds.- Authentication Mechanism.- Multi-Device Anonymous Authentication.- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism.- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.- Cloud Computing Security.- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments.- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms.- Data Mining for Security Application.- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security.- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade.- Digital Signature.- Two-in-One Oblivious Signatures Secure in the Random Oracle Model.- A New Transitive Signature Scheme.- Privacy-preserving Technologies.- Privacy-Preserving Profile Matching Protocol Considering Conditions.- Privacy Preserving Credit Systems.- Evading System-Calls Based Intrusion Detection Systems.- Network Security and Forensic.- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.- A Network Timestamp Verification Mechanism for Forensic Analysis.- Searchable Encryption.- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards.- A System of Shareable Keyword Search on Encrypted Data.- Security Policy and Access Control.- An Attribute Based Protection Model for JSON Documents.- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA.- Security Protocols.- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication.- Expressive Rating Scheme by Signatures with Predications on Ratees.- Symmetric Key Cryptography.- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers.- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.- System Security.- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern.- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks.- Iris Cancellable Template Generation based on Indexing-First-One Hashing.- Web Security.- Detecting Malicious URLs Using Lexical Analysis.- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo.- Data Mining for Security Application (Short Paper).- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.- Provable Seucirty (Short Paper).- Improved Security Proofs for Modular Exponentiation Bits.- Security Protocol (Short Paper).- Secure Outsourced Bilinear Pairings Computation for Mobile Devices.- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.