Network and System Security [E-Book] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung.
Chen, Jiageng, (editor)
Piuri, Vincenzo, (editor) / Su, Chunhua, (editor) / Yung, Moti, (editor)
Cham : Springer, 2016
XIV, 540 p. 128 illus. online resource.
Lecture notes in computer science ; 9955
Full Text
Table of Contents:
  • Invited paper
  • While Mobile Encounters with Clouds
  • Authentication Mechanism
  • Multi-Device Anonymous Authentication
  • A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism
  • Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications
  • Cloud Computing Security
  • Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing
  • An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments
  • An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms
  • Data Mining for Security Application
  • Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security
  • Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade
  • Digital Signature
  • Two-in-One Oblivious Signatures Secure in the Random Oracle Model
  • A New Transitive Signature Scheme
  • Privacy-preserving Technologies
  • Privacy-Preserving Profile Matching Protocol Considering Conditions
  • Privacy Preserving Credit Systems
  • Evading System-Calls Based Intrusion Detection Systems
  • Network Security and Forensic
  • HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks
  • A Network Timestamp Verification Mechanism for Forensic Analysis
  • Searchable Encryption
  • An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords
  • Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards
  • A System of Shareable Keyword Search on Encrypted Data
  • Security Policy and Access Control
  • An Attribute Based Protection Model for JSON Documents
  • The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA
  • Security Protocols
  • MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
  • Expressive Rating Scheme by Signatures with Predications on Ratees
  • Symmetric Key Cryptography
  • A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers
  • Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR
  • System Security
  • DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern
  • PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks
  • Iris Cancellable Template Generation based on Indexing-First-One Hashing
  • Web Security
  • Detecting Malicious URLs Using Lexical Analysis
  • Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo
  • Data Mining for Security Application (Short Paper)
  • Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining
  • Provable Seucirty (Short Paper)
  • Improved Security Proofs for Modular Exponentiation Bits
  • Security Protocol (Short Paper)
  • Secure Outsourced Bilinear Pairings Computation for Mobile Devices
  • The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.