NSS B

40 papers

YearTitle / Authors
2012(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack.
Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo
2012A Bird's Eye View on the I2P Anonymous File-Sharing Environment.
Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor
2012A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data.
Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani
2012A Communication Efficient Group Key Distribution Scheme for MANETs.
Yang Yang
2012A Scalable Link Model for Local Optical Wireless Networks.
Tae-Gyu Lee, Gi-Soo Chung
2012A Secure and Private RFID Authentication Protocol under SLPN Problem.
Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman
2012Addressing Situational Awareness in Critical Domains of a Smart Grid.
Cristina Alcaraz, Javier López
2012An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks.
Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding
2012Attestation of Mobile Baseband Stacks.
Steffen Wagner, Sascha Wessel, Frederic Stumpf
2012Background Transfer Method for Ubiquitous Computing.
Tae-Gyu Lee, Gi-Soo Chung
2012Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net.
Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu
2012Cryptanalysis of Exhaustive Search on Attacking RSA.
Mu-En Wu, Raylin Tso, Hung-Min Sun
2012Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture.
Ding Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui
2012Detecting Spammers via Aggregated Historical Data Set.
Eitan Menahem, Rami Puzis, Yuval Elovici
2012Differential Privacy Data Release through Adding Noise on Average Value.
Xilin Zhang, Yingjie Wu, Xiaodong Wang
2012Direct CCA Secure Identity-Based Broadcast Encryption.
Leyou Zhang, Qing Wu, Yupu Hu
2012Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu
2012Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan
2012Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection.
Yuxin Meng, Lam-for Kwok
2012Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity.
Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou
2012FlexCOS: An Open Smartcard Platform for Research and Education.
Kristian Beilke, Volker Roth
2012Identifying OS Kernel Objects for Run-Time Security Analysis.
Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy
2012Impossible Differential Cryptanalysis on Tweaked E2.
Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du
2012Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors.
Jing Guo, Zhuxiao Wang
2012Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks.
Huimin Shuai, Wen Tao Zhu
2012Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC).
Nima Mousavi, Mahesh V. Tripunitara
2012Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
Li Xu, Elisa Bertino, Yi Mu
2012On the Automated Analysis of Safety in Usage Control: A New Decidability Result.
Silvio Ranise, Alessandro Armando
2012On the Improvement of Fermat Factorization.
Mu-En Wu, Raylin Tso, Hung-Min Sun
2012Operating System Kernel Data Disambiguation to Support Security Analysis.
Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy
2012Practical Certificateless Public Key Encryption in the Standard Model.
Wenjie Yang, Futai Zhang, Limin Shen
2012Private Friends on a Social Networking Site Operated by an Overly Curious SNP.
Roman Schlegel, Duncan S. Wong
2012Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques.
Lukasz Krzywiecki, Miroslaw Kutylowski
2012Proxy Signature Scheme Based on Isomorphisms of Polynomials.
Shaohua Tang, Lingling Xu
2012Resilience Strategies for Networked Malware Detection and Remediation.
Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, Alberto E. Schaeffer Filho
2012Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption.
Shengli Liu, Fangguo Zhang, Kefei Chen
2012Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks.
Sushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin
2012The Performance of Public Key-Based Authentication Protocols.
Kaiqi Xiong
2012Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games.
Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan
2012Universal Designated Verifier Signcryption.
Fei Tang, Changlu Lin, Pinhui Ke