NSS B

36 papers

YearTitle / Authors
2016A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism.
Jia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai
2016A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers.
Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam
2016A New Transitive Signature Scheme.
Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo
2016A System of Shareable Keyword Search on Encrypted Data.
Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun
2016An Attribute-Based Protection Model for JSON Documents.
Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan
2016An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Tingting Wang, Man Ho Au, Wei Wu
2016An Energy-Efficient Task Scheduling Heuristic Algorithm Without Virtual Machine Migration in Real-Time Cloud Environments.
Yi Zhang, Liuhua Chen, Haiying Shen, Xiaohui Cheng
2016An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms.
Shashank Gupta, Brij Bhooshan Gupta
2016DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern.
Qiumao Ma, Wensheng Zhang, Jinsheng Zhang
2016Detecting Malicious URLs Using Lexical Analysis.
Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani
2016Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jia-Nan Liu
2016Evading System-Calls Based Intrusion Detection Systems.
Ishai Rosenberg, Ehud Gudes
2016Expressive Rating Scheme by Signatures with Predications on Ratees.
Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai
2016Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2016Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.
Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo
2016Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo.
Bailin Xie, Yu Wang, Chao Chen, Yang Xiang
2016HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.
Toshihiro Yamauchi, Yuta Ikegami
2016Improved Security Proof for Modular Exponentiation Bits.
Kewei Lv, Wenjie Qin, Ke Wang
2016Iris Cancellable Template Generation Based on Indexing-First-One Hashing.
Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap
2016Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security.
Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang
2016MD-
Gang Sheng, Chunming Tang, Wei Gao, Ying Yin
2016Multi-device Anonymous Authentication.
Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski
2016Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun
2016Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings
Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
2016On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A.
Asma Alshehri, Ravi S. Sandhu
2016PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip
2016Privacy Preserving Credit Systems.
Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao
2016Privacy-Preserving Profile Matching Protocol Considering Conditions.
Yosuke Ishikuro, Kazumasa Omote
2016Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade.
Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis
2016Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards.
Fangming Zhao, Takashi Nishide
2016Secure Outsourced Bilinear Pairings Computation for Mobile Devices.
Tomasz Hyla, Jerzy Pejas
2016The Design and Implementation of Multi-dimensional Bloom Filter Storage Matrix.
Fei Xu, Pinxin Liu, Jianfeng Yang, Jing Xu
2016The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment.
Maanak Gupta, Ravi S. Sandhu
2016Timestamp Analysis for Quality Validation of Network Forensic Data.
Nikolai Hampton, Zubair A. Baig
2016Two-in-One Oblivious Signatures Secure in the Random Oracle Model.
Raylin Tso
2016While Mobile Encounters with Clouds.
Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu