NSS B

72 papers

YearTitle / Authors
2013A Comprehensive Access Control System for Scientific Applications.
Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino
2013A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.
Jia Hu, Hui Lin, Li Xu
2013A Finger-Vein Based Cancellable Bio-cryptosystem.
Wencheng Yang, Jiankun Hu, Song Wang
2013A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR.
Mahdi Aiash
2013A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie
2013A New Unpredictability-Based RFID Privacy Model.
Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang
2013A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.
Mahdi Aiash
2013A Pairing-Free Identity Based Authentication Framework for Cloud Computing.
Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay
2013A Technology Independent Security Gateway for Real-Time Multimedia Communication.
Fudong Li, Nathan L. Clarke, Steven Furnell
2013An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks.
Elisavet Konstantinou
2013Ancestor Excludable Hierarchical ID-Based Encryption Revisited.
Fan Zhang, Hua Guo, Zhoujun Li
2013Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.
Suaad S. Alarifi, Stephen D. Wolthusen
2013Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.
Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig
2013Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.
Shaohua Tang, Lingling Xu
2013Building Better Unsupervised Anomaly Detector with S-Transform.
Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi
2013Collusion-Resistant Domain-Specific Pseudonymous Signatures.
Julien Bringer, Hervé Chabanne, Alain Patey
2013Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments.
Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen
2013Distributed and Anonymous Publish-Subscribe.
Jörg Daubert, Mathias Fischer, Stefan Schiffner, Max Mühlhäuser
2013Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.
Y. Sreenivasa Rao, Ratna Dutta
2013Efficient and Private Three-Party Publish/Subscribe.
Giovanni Di Crescenzo, Jim Burns, Brian A. Coan, John L. Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright
2013Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs.
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale
2013Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Yuxin Meng, Wenjuan Li, Lam-for Kwok
2013Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.
Yao Lu, Rui Zhang, Dongdai Lin
2013Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs.
Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang
2013Filtering Trolling Comments through Collective Classification.
Jorge de-la-Peña-Sordo, Igor Santos, Iker Pastor-López, Pablo García Bringas
2013Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.
Alessandro Armando, Roberto Carbone, Luca Zanetti
2013Forward Secure Certificateless Proxy Signature Scheme.
Jiguo Li, Yanqiong Li, Yichen Zhang
2013Human Identification with Electroencephalogram (EEG) for the Future Network Security.
Xu Huang, Salahiddin Altahat, Dat Tran, Shutao Li
2013Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.
Chao Wang, Kefei Mao, Jianwei Liu, Jianhua Liu
2013Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.
Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini, Elisa Bertino
2013Insiders Trapped in the Mirror Reveal Themselves in Social Media.
Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis
2013JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms.
Benoît Bertholon, Sébastien Varrette, Pascal Bouvry
2013Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.
Hongda Li, Qihua Niu, Bei Liang
2013Leveraging String Kernels for Malware Detection.
Jonas Pfoh, Christian A. Schneider, Claudia Eckert
2013Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.
Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto
2013Light Weight Network Coding Based Key Distribution Scheme for MANETs.
Jianwei Liu, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu
2013MADS: Malicious Android Applications Detection through String Analysis.
Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo García Bringas
2013Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.
Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino
2013Measuring and Comparing the Protection Quality in Different Operating Systems.
Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng
2013Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.
Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang
2013Model the Influence of Sybil Nodes in P2P Botnets.
Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi
2013Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Sheng Wen, Yang Xiang, Wanlei Zhou
2013Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
Javier López, Xinyi Huang, Ravi S. Sandhu
2013Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.
Gabriel Cartier, Jean-François Cartier, José M. Fernandez
2013On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework.
George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis
2013On Secure and Power-Efficient RFID-Based Wireless Body Area Network.
Sana Ullah, Waleed Alsalih
2013On the Applicability of Time-Driven Cache Attacks on Mobile Devices.
Raphael Spreitzer, Thomas Plos
2013On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems.
Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador
2013On the Security of an Efficient Attribute-Based Signature.
Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang
2013On the Use of Key Assignment Schemes in Authentication Protocols.
James Alderman, Jason Crampton
2013Partial Fingerprint Reconstruction with Improved Smooth Extension.
Wei Zhou, Jiankun Hu, Ian R. Petersen, Mohammed Bennamoun
2013Performance Prediction Model for Block Ciphers on GPU Architectures.
Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
2013Privacy Preserving Context Aware Publish Subscribe Systems.
Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann
2013Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.
Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
2013Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Weijia Wang, Lei Hu, Yong Li
2013Secure Storage and Fuzzy Query over Encrypted Databases.
Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan
2013Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force Attacks.
Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto
2013Security Authentication of AODV Protocols in MANETs.
Ahmad Alomari
2013Static Analysis for Regular Expression Denial-of-Service Attacks.
James Kirrage, Asiri Rathnayake, Hayo Thielecke
2013Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.
Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro
2013The OffPAD: Requirements and Usage.
Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé
2013Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng
2013Threshold-Oriented Optimistic Fair Exchange.
Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo
2013Towards Authenticated Objects.
Daniele Midi, Ashish Kundu, Elisa Bertino
2013Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.
Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias
2013Towards a More Secure Apache Hadoop HDFS Infrastructure - Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures.
Jason Cohen, Subatra Acharya
2013Towards a Privacy-Preserving Solution for OSNs.
Qiang Tang
2013Tracing Sources of Anonymous Slow Suspicious Activities.
Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
2013Using Trusted Platform Modules for Location Assurance in Cloud Networking.
Christoph Krauß, Volker Fusenig
2013Using the Smart Card Web Server in Secure Branchless Banking.
Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis
2013Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens.
Kannan Karthik
2013X-TIER: Kernel Module Injection.
Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert