Online Library TheLib.net » Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
cover of the book Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

Ebook: Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

00
27.01.2024
0
0

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.




This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.

The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.




This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.

The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.


Content:
Front Matter....Pages -
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection....Pages 1-14
On the Automated Analysis of Safety in Usage Control: A New Decidability Result....Pages 15-28
Attestation of Mobile Baseband Stacks....Pages 29-43
A Scalable Link Model for Local Optical Wireless Networks....Pages 44-57
Addressing Situational Awareness in Critical Domains of a Smart Grid....Pages 58-71
Identifying OS Kernel Objects for Run-Time Security Analysis....Pages 72-85
Background Transfer Method for Ubiquitous Computing....Pages 86-99
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption....Pages 100-112
Proxy Signature Scheme Based on Isomorphisms of Polynomials....Pages 113-125
Universal Designated Verifier Signcryption....Pages 126-134
A Bird’s Eye View on the I2P Anonymous File-Sharing Environment....Pages 135-148
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data....Pages 149-165
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity....Pages 166-179
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks....Pages 180-191
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks....Pages 192-205
The Performance of Public Key-Based Authentication Protocols....Pages 206-219
Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net....Pages 220-232
Resilience Strategies for Networked Malware Detection and Remediation....Pages 233-247
Detecting Spammers via Aggregated Historical Data Set....Pages 248-262
Operating System Kernel Data Disambiguation to Support Security Analysis....Pages 263-276
FlexCOS: An Open Smartcard Platform for Research and Education....Pages 277-290
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games....Pages 291-304
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques....Pages 305-319
Practical Certificateless Public Key Encryption in the Standard Model....Pages 320-333
(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack....Pages 334-347
Direct CCA Secure Identity-Based Broadcast Encryption....Pages 348-360
A Communication Efficient Group Key Distribution Scheme for MANETs....Pages 361-372
Cryptanalysis of Exhaustive Search on Attacking RSA....Pages 373-379
On the Improvement of Fermat Factorization....Pages 380-391
Impossible Differential Cryptanalysis on Tweaked E2....Pages 392-404
Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors....Pages 405-416
Differential Privacy Data Release through Adding Noise on Average Value....Pages 417-429
Private Friends on a Social Networking Site Operated by an Overly Curious SNP....Pages 430-444
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks....Pages 445-461
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture....Pages 462-475
A Secure and Private RFID Authentication Protocol under SLPN Problem....Pages 476-489
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud....Pages 490-502
Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks....Pages 503-515
Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC)....Pages 516-529
Back Matter....Pages -


This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.

The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.


Content:
Front Matter....Pages -
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection....Pages 1-14
On the Automated Analysis of Safety in Usage Control: A New Decidability Result....Pages 15-28
Attestation of Mobile Baseband Stacks....Pages 29-43
A Scalable Link Model for Local Optical Wireless Networks....Pages 44-57
Addressing Situational Awareness in Critical Domains of a Smart Grid....Pages 58-71
Identifying OS Kernel Objects for Run-Time Security Analysis....Pages 72-85
Background Transfer Method for Ubiquitous Computing....Pages 86-99
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption....Pages 100-112
Proxy Signature Scheme Based on Isomorphisms of Polynomials....Pages 113-125
Universal Designated Verifier Signcryption....Pages 126-134
A Bird’s Eye View on the I2P Anonymous File-Sharing Environment....Pages 135-148
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data....Pages 149-165
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity....Pages 166-179
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks....Pages 180-191
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks....Pages 192-205
The Performance of Public Key-Based Authentication Protocols....Pages 206-219
Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net....Pages 220-232
Resilience Strategies for Networked Malware Detection and Remediation....Pages 233-247
Detecting Spammers via Aggregated Historical Data Set....Pages 248-262
Operating System Kernel Data Disambiguation to Support Security Analysis....Pages 263-276
FlexCOS: An Open Smartcard Platform for Research and Education....Pages 277-290
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games....Pages 291-304
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques....Pages 305-319
Practical Certificateless Public Key Encryption in the Standard Model....Pages 320-333
(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack....Pages 334-347
Direct CCA Secure Identity-Based Broadcast Encryption....Pages 348-360
A Communication Efficient Group Key Distribution Scheme for MANETs....Pages 361-372
Cryptanalysis of Exhaustive Search on Attacking RSA....Pages 373-379
On the Improvement of Fermat Factorization....Pages 380-391
Impossible Differential Cryptanalysis on Tweaked E2....Pages 392-404
Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors....Pages 405-416
Differential Privacy Data Release through Adding Noise on Average Value....Pages 417-429
Private Friends on a Social Networking Site Operated by an Overly Curious SNP....Pages 430-444
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks....Pages 445-461
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture....Pages 462-475
A Secure and Private RFID Authentication Protocol under SLPN Problem....Pages 476-489
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud....Pages 490-502
Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks....Pages 503-515
Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC)....Pages 516-529
Back Matter....Pages -
....
Download the book Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen