Atnaujinkite slapukų nuostatas

El. knyga: Network and System Security: 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 9408
  • Išleidimo metai: 23-Nov-2015
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783319256450
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 9408
  • Išleidimo metai: 23-Nov-2015
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783319256450
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015.

The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

 





 
Wireless Security and Privacy
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks
3(15)
Wei Wang
Mikhail Istomin
Jeffrey Bickford
Distance-Based Trustworthiness Assessment for Sensors in Wireless Sensor Networks
18(14)
Jongho Won
Elisa Bertino
Isolation of Multiple Anonymous Attackers in Mobile Networks
32(14)
Brian Ricks
Patrick Tague
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position
46(17)
Giuseppe Ateniese
Briland Hitaj
Luigi Vincenzo Mancini
Nino Vincenzo Verde
Antonio Villani
Smartphone Security
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach
63(15)
Guillermo Suarez-Tangil
Juan E. Tapiador
Pedro Peris-Lopez
Android Botnets: What URLs are Telling Us
78(17)
Andi Fitriah Abdul Kadir
Natalia Stakhanova
Ali Akbar Ghorbani
Systems Security
Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs
95(17)
Devu Manikantan Shila
Vivek Venugopalan
Cameron D. Patterson
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices
112(18)
Javid Habibi
Ajay Panicker
Aditi Gupta
Elisa Bertino
Service in Denial -- Clouds Going with the Winds
130(17)
Vit Bukac
Vlasta Stavova
Lukas Nemec
Zdenek Riha
Vashek Matyas
Application Security
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory
147(15)
Weizhi Meng
Indicators of Malicious SSL Connections
162(14)
Riccardo Bortolameotti
Andreas Peter
Maarten H. Everts
Damiano Bolzoni
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing
176(15)
Jinwei Xu
Jiankun Hu
Security Management
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection
191(15)
Jaideep Vaidya
Basit Shafiq
Vijayalakshmi Atluri
David Lorenzi
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust
206(15)
Navid Pustchi
Ravi Sandhu
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing
221(18)
Mahendra Pratap Singh
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
Ussama Yakub
Applied Cryptography
CLKS: Certificateless Keyword Search on Encrypted Data
239(15)
Qingji Zheng
Xiangxue Li
Aytac Azgin
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control
254(14)
Hui Ma
Rui Zhang
GP-ORAM: A Generalized Partition ORAM
268(15)
Jinsheng Zhang
Wensheng Zhang
Daji Qiao
Anonymous Evaluation System
283(20)
Kamil Kluczniak
Lucjan Hanzlik
Przemyslaw Kubiak
Miroslaw Kutylowski
Cryptosystems
An Efficient Leveled Identity-Based FHE
303(13)
Fuqun Wang
Kunpeng Wang
Bao Li
Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks
316(15)
Ashish Jain
Narendra S. Chaudhari
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher
331(14)
Xiaoshuang Ma
Kexin Qiao
A New Statistical Approach for Integral Attack
345(14)
Jiageng Chen
Atsuko Miyaji
Chunhua Su
Liang Zhao
Short Papers: Cryptographic Mechanisms
Foundations of Optical Encryption: A Candidate Short-Key Scheme
359(9)
Giovanni Di Crescenzo
Ronald Menendez
Shahab Etemad
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain
368(8)
Duane Wilson
Giuseppe Ateniese
A Scalable Multiparty Private Set Intersection
376(10)
Atsuko Miyaji
Shohei Nishida
Electronic Contract Signing Without Using Trusted Third Party
386(9)
Zhiguo Wan
Robert H. Deng
David Lee
New Message Authentication Code Based on APN Functions and Stream Ciphers
395(10)
Teng Wu
Guang Gong
Short Papers: Security Mechanisms
Assessing Attack Surface with Component-Based Package Dependency
405(13)
Su Zhang
Xinwen Zhang
Xinming Ou
Liqun Chen
Nigel Edwards
Jing Jin
An Abstraction for the Interoperability Analysis of Security Policies
418(10)
Javier Baliosian
Ana Cavalli
Cryptographically Secure On-Chip Firewalling
428(11)
Jean-Michel Cioranesco
Craig Hampel
Guilherme Ozari de Almeida
Rodrigo Portella do Canto
Enforcing Privacy in Distributed Multi-domain Network Anomaly Detection
439(10)
Christian Callegari
Stefano Giordano
Michele Pagano
Short Papers: Mobile and Cloud Security
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems
449(10)
Chao Li
Balaji Palanisamy
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks
459(8)
Li Xu
Limei Lin
Sheng Wen
A Study of Network Domains Used in Android Applications
467(8)
Mark E. Fioravanti
Ayush Shah
Shengzhi Zhang
Detecting Malicious Activity on Smartphones Using Sensor Measurements
475(13)
Roger Piqueras Jover
Ilona Murynets
Jeffrey Bickford
A Game Theoretic Framework for Cloud Security Transparency
488(15)
Abdulaziz Aldribi
Issa Traore
Short Papers: Application and Network Security
Let's Get Mobile: Secure FOTA for Automotive System
503(8)
Hafizah Mansor
Konstantinos Markantonakis
Raja Naeem Akram
Keith Mayes
VICI: Visual Caller Identification for Contact Center Applications
511(8)
P. Krishnan
Navjot Singh
Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System
519(12)
Ross K. Gegan
Rennie Archibald
Matthew K. Farrens
Dipak Ghosal
Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks
531(10)
Hang Cai
Krishna K. Venkatasubramanian
Author Index 541