NSS B

48 papers

YearTitle / Authors
2014A Dynamic Matching Secret Handshake Scheme without Random Oracles.
Yamin Wen, Zheng Gong
2014A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service.
Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu
2014A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu
2014A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Yonglin Hao, Dongxia Bai, Leibo Li
2014A New Approach to Executable File Fragment Detection in Network Forensics.
Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma
2014A New Multivariate Based Threshold Ring Signature Scheme.
Jingwan Zhang, Yiming Zhao
2014A New Public Key Encryption with Equality Test.
Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun
2014A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.
Mengmeng Ge, Kim-Kwang Raymond Choo
2014A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers.
Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
2014A Proposed Approach to Compound File Fragment Identification.
Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma
2014A Secure Obfuscator for Encrypted Blind Signature Functionality.
Xiao Feng, Zheng Yuan
2014A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique.
Yumei Li, Holger Voos, Albert Rosich, Mohamed Darouach
2014Adopting Provenance-Based Access Control in OpenStack Cloud IaaS.
Dang Nguyen, Jaehong Park, Ravi S. Sandhu
2014An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette
2014Attribute-Based Signing Right Delegation.
Weiwei Liu, Yi Mu, Guomin Yang
2014Capturing Android Malware Behaviour Using System Flow Graph.
Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong
2014Certificate-Based Conditional Proxy Re-Encryption.
Jiguo Li, Xuexia Zhao, Yichen Zhang
2014Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios.
Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia
2014Cryptanalysis on the Authenticated Cipher Sablier.
Xiutao Feng, Fan Zhang
2014Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang
2014Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD.
Miao Xie, Jiankun Hu, Xinghuo Yu, Elizabeth Chang
2014Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack.
Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry
2014Extending OpenStack Access Control with Domain Trust.
Bo Tang, Ravi S. Sandhu
2014Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features.
Wei Zhou, Jiankun Hu, Song Wang, Ian R. Petersen, Mohammed Bennamoun
2014Formal Analysis of DAA-Related APIs in TPM 2.0.
Li Xi, Dengguo Feng
2014Formal Verification of Finite State Transactional Security Policy.
N. Rajamanickam, R. Nadarajan, Atilla Elçi
2014GO-ABE: Group-Oriented Attribute-Based Encryption.
Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu
2014Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework.
Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi
2014Hierarchical Solution for Access Control and Authentication in Software Defined Networks.
Shuangyu He, Jianwei Liu, Jian Mao, Jie Chen
2014How to Evaluate Trust Using MMT.
Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli
2014Identity Based Threshold Ring Signature from Lattices.
Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao
2014Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang
2014Identity-Based Transitive Signcryption.
Shuquan Hou, Xinyi Huang, Li Xu
2014Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014Jhanwar-Barua's Identity-Based Encryption Revisited.
Ibrahim F. Elashry, Yi Mu, Willy Susilo
2014Lightweight Universally Composable Adaptive Oblivious Transfer.
Vandana Guleria, Ratna Dutta
2014Multi-domain Direct Anonymous Attestation Scheme from Pairings.
Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao
2014Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings
Man Ho Au, Barbara Carminati, C.-C. Jay Kuo
2014On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou
2014Privacy Preserving Biometrics-Based and User Centric Authentication Protocol.
Hasini Gunasinghe, Elisa Bertino
2014Rational Secure Two-party Computation in Social Cloud.
Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu
2014Revisiting Node Injection of P2P Botnet.
Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng
2014Security Analysis and Improvement of Femtocell Access Control.
Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu
2014Tighter Security Bound of MIBS Block Cipher against Differential Attack.
Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan
2014Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS.
Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
2014eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy.
Tapas Pandit, Rana Barua, Somanath Tripathy
2014iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu
2014psOBJ: Defending against Traffic Analysis with pseudo-Objects.
Yi Tang, Piaoping Lin, Zhaokai Luo