NSS B

42 papers

YearTitle / Authors
2015A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi
2015A Game Theoretic Framework for Cloud Security Transparency.
Abdulaziz Aldribi, Issa Traoré
2015A New Statistical Approach for Integral Attack.
Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao
2015A Scalable Multiparty Private Set Intersection.
Atsuko Miyaji, Shohei Nishida
2015A Study of Network Domains Used in Android Applications.
Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang
2015An Abstraction for the Interoperability Analysis of Security Policies.
Javier Baliosian, Ana R. Cavalli
2015An Efficient Leveled Identity-Based FHE.
Fuqun Wang, Kunpeng Wang, Bao Li
2015Android Botnets: What URLs are Telling Us.
Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani
2015Anonymous Evaluation System.
Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski
2015Assessing Attack Surface with Component-Based Package Dependency.
Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, Jing Jin
2015CLKS: Certificateless Keyword Search on Encrypted Data.
Qingji Zheng, Xiangxue Li, Aytac Azgin
2015Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach.
Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez
2015Cryptographically Secure On-Chip Firewalling.
Jean-Michel Cioranesco, Craig Hampel, Guilherme Ozari de Almeida, Rodrigo Portella do Canto
2015Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks.
Wei Wang, Mikhail Istomin, Jeffrey Bickford
2015De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems.
Chao Li, Balaji Palanisamy
2015Detecting Malicious Activity on Smartphones Using Sensor Measurements.
Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford
2015Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks.
Hang Cai, Krishna K. Venkatasubramanian
2015DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices.
Javid Habibi, Ajay Panicker, Aditi Gupta, Elisa Bertino
2015Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks.
Jongho Won, Elisa Bertino
2015Electronic Contract Signing Without Using Trusted Third Party.
Zhiguo Wan, Robert H. Deng, David Lee
2015Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection.
Christian Callegari, Stefano Giordano, Michele Pagano
2015Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks.
Ashish Jain, Narendra S. Chaudhari
2015First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Li Xu, Limei Lin, Sheng Wen
2015Foundations of Optical Encryption: A Candidate Short-Key Scheme.
Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad
2015From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain.
Duane Wilson, Giuseppe Ateniese
2015GP-ORAM: A Generalized Partition ORAM.
Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2015Indicators of Malicious SSL Connections.
Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni
2015Isolation of Multiple Anonymous Attackers in Mobile Networks.
Brian Ricks, Patrick Tague
2015Let's Get Mobile: Secure FOTA for Automotive System.
Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes
2015MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust.
Navid Pustchi, Ravi S. Sandhu
2015Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.
Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub
2015Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing.
Jinwei Xu, Jiankun Hu
2015Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings
Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
2015New Message Authentication Code Based on APN Functions and Stream Ciphers.
Teng Wu, Guang Gong
2015No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani
2015Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System.
Ross K. Gegan, Rennie Archibald, Matthew K. Farrens, Dipak Ghosal
2015Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher.
Xiaoshuang Ma, Kexin Qiao
2015RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory.
Weizhi Meng
2015Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control.
Hui Ma, Rui Zhang
2015Service in Denial - Clouds Going with the Winds.
Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Ríha, Vashek Matyas
2015Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs.
Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson
2015VICI: Visual Caller Identification for Contact Center Applications.
P. Krishnan, Navjot Singh