Ebook: Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
- Tags: Systems and Data Security, Computer Communication Networks, Data Encryption, Management of Computing and Information Systems, e-Commerce/e-business
- Series: Lecture Notes in Computer Science 7873
- Year: 2013
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).
Content:
Front Matter....Pages -
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study....Pages 1-13
A Technology Independent Security Gateway for Real-Time Multimedia Communication....Pages 14-25
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network....Pages 26-39
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection....Pages 40-53
Model the Influence of Sybil Nodes in P2P Botnets....Pages 54-67
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture....Pages 68-79
The OffPAD: Requirements and Usage....Pages 80-93
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks....Pages 94-108
Using Trusted Platform Modules for Location Assurance in Cloud Networking....Pages 109-121
Tracing Sources of Anonymous Slow Suspicious Activities....Pages 122-134
Static Analysis for Regular Expression Denial-of-Service Attacks....Pages 135-148
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding....Pages 149-163
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning....Pages 164-177
MADS: Malicious Android Applications Detection through String Analysis....Pages 178-191
X-TIER: Kernel Module Injection....Pages 192-205
Leveraging String Kernels for Malware Detection....Pages 206-219
Insiders Trapped in the Mirror Reveal Themselves in Social Media....Pages 220-235
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework....Pages 236-249
Using the Smart Card Web Server in Secure Branchless Banking....Pages 250-263
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach....Pages 264-277
Efficient and Private Three-Party Publish/Subscribe....Pages 278-292
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks....Pages 293-306
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform....Pages 307-320
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines....Pages 321-335
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms....Pages 336-349
Forward Secure Certificateless Proxy Signature Scheme....Pages 350-364
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP....Pages 365-380
On the Security of an Efficient Attribute-Based Signature....Pages 381-392
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method....Pages 393-404
Performance Prediction Model for Block Ciphers on GPU Architectures....Pages 405-423
Threshold-Oriented Optimistic Fair Exchange....Pages 424-438
Secure Storage and Fuzzy Query over Encrypted Databases....Pages 439-450
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation....Pages 451-464
Privacy Preserving Context Aware Publish Subscribe Systems....Pages 465-478
A New Unpredictability-Based RFID Privacy Model....Pages 479-492
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption....Pages 493-506
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting....Pages 507-520
Light Weight Network Coding Based Key Distribution Scheme for MANETs....Pages 521-534
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network....Pages 535-548
Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards....Pages 549-562
An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks....Pages 563-574
Human Identification with Electroencephalogram (EEG) for the Future Network Security....Pages 575-581
Building Better Unsupervised Anomaly Detector with S-Transform....Pages 582-589
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs....Pages 590-598
Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens....Pages 599-606
On the Use of Key Assignment Schemes in Authentication Protocols....Pages 607-613
On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems....Pages 614-620
Security Authentication of AODV Protocols in MANETs....Pages 621-627
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach....Pages 628-634
Towards a Privacy-Preserving Solution for OSNs....Pages 635-641
Measuring and Comparing the Protection Quality in Different Operating Systems....Pages 642-648
Collusion-Resistant Domain-Specific Pseudonymous Signatures....Pages 649-655
On the Applicability of Time-Driven Cache Attacks on Mobile Devices....Pages 656-662
Ancestor Excludable Hierarchical ID-Based Encryption Revisited....Pages 663-670
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks....Pages 671-677
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks....Pages 678-684
Distributed and Anonymous Publish-Subscribe....Pages 685-691
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs....Pages 692-698
Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments....Pages 699-706
Filtering Trolling Comments through Collective Classification....Pages 707-713
Security Analysis of Touch Inputted Passwords....Pages 714-720
A Pairing-Free Identity Based Authentication Framework for Cloud Computing....Pages 721-727
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols....Pages 728-734
Towards a More Secure Apache Hadoop HDFS Infrastructure....Pages 735-741
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR....Pages 742-748
A Comprehensive Access Control System for Scientific Applications....Pages 749-755
Partial Fingerprint Reconstruction with Improved Smooth Extension....Pages 756-762
Modeling and Analysis for Thwarting Worm Propagation in Email Networks....Pages 763-769
On Secure and Power-Efficient RFID-Based Wireless Body Area Network....Pages 770-776
Towards Authenticated Objects....Pages 777-783
A Finger-Vein Based Cancellable Bio-cryptosystem....Pages 784-790
Back Matter....Pages -
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).
Content:
Front Matter....Pages -
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study....Pages 1-13
A Technology Independent Security Gateway for Real-Time Multimedia Communication....Pages 14-25
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network....Pages 26-39
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection....Pages 40-53
Model the Influence of Sybil Nodes in P2P Botnets....Pages 54-67
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture....Pages 68-79
The OffPAD: Requirements and Usage....Pages 80-93
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks....Pages 94-108
Using Trusted Platform Modules for Location Assurance in Cloud Networking....Pages 109-121
Tracing Sources of Anonymous Slow Suspicious Activities....Pages 122-134
Static Analysis for Regular Expression Denial-of-Service Attacks....Pages 135-148
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding....Pages 149-163
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning....Pages 164-177
MADS: Malicious Android Applications Detection through String Analysis....Pages 178-191
X-TIER: Kernel Module Injection....Pages 192-205
Leveraging String Kernels for Malware Detection....Pages 206-219
Insiders Trapped in the Mirror Reveal Themselves in Social Media....Pages 220-235
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework....Pages 236-249
Using the Smart Card Web Server in Secure Branchless Banking....Pages 250-263
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach....Pages 264-277
Efficient and Private Three-Party Publish/Subscribe....Pages 278-292
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks....Pages 293-306
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform....Pages 307-320
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines....Pages 321-335
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms....Pages 336-349
Forward Secure Certificateless Proxy Signature Scheme....Pages 350-364
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP....Pages 365-380
On the Security of an Efficient Attribute-Based Signature....Pages 381-392
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method....Pages 393-404
Performance Prediction Model for Block Ciphers on GPU Architectures....Pages 405-423
Threshold-Oriented Optimistic Fair Exchange....Pages 424-438
Secure Storage and Fuzzy Query over Encrypted Databases....Pages 439-450
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation....Pages 451-464
Privacy Preserving Context Aware Publish Subscribe Systems....Pages 465-478
A New Unpredictability-Based RFID Privacy Model....Pages 479-492
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption....Pages 493-506
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting....Pages 507-520
Light Weight Network Coding Based Key Distribution Scheme for MANETs....Pages 521-534
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network....Pages 535-548
Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards....Pages 549-562
An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks....Pages 563-574
Human Identification with Electroencephalogram (EEG) for the Future Network Security....Pages 575-581
Building Better Unsupervised Anomaly Detector with S-Transform....Pages 582-589
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs....Pages 590-598
Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens....Pages 599-606
On the Use of Key Assignment Schemes in Authentication Protocols....Pages 607-613
On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems....Pages 614-620
Security Authentication of AODV Protocols in MANETs....Pages 621-627
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach....Pages 628-634
Towards a Privacy-Preserving Solution for OSNs....Pages 635-641
Measuring and Comparing the Protection Quality in Different Operating Systems....Pages 642-648
Collusion-Resistant Domain-Specific Pseudonymous Signatures....Pages 649-655
On the Applicability of Time-Driven Cache Attacks on Mobile Devices....Pages 656-662
Ancestor Excludable Hierarchical ID-Based Encryption Revisited....Pages 663-670
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks....Pages 671-677
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks....Pages 678-684
Distributed and Anonymous Publish-Subscribe....Pages 685-691
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs....Pages 692-698
Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments....Pages 699-706
Filtering Trolling Comments through Collective Classification....Pages 707-713
Security Analysis of Touch Inputted Passwords....Pages 714-720
A Pairing-Free Identity Based Authentication Framework for Cloud Computing....Pages 721-727
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols....Pages 728-734
Towards a More Secure Apache Hadoop HDFS Infrastructure....Pages 735-741
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR....Pages 742-748
A Comprehensive Access Control System for Scientific Applications....Pages 749-755
Partial Fingerprint Reconstruction with Improved Smooth Extension....Pages 756-762
Modeling and Analysis for Thwarting Worm Propagation in Email Networks....Pages 763-769
On Secure and Power-Efficient RFID-Based Wireless Body Area Network....Pages 770-776
Towards Authenticated Objects....Pages 777-783
A Finger-Vein Based Cancellable Bio-cryptosystem....Pages 784-790
Back Matter....Pages -
....
Download the book Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)