Skip to main content
  • Conference proceedings
  • © 2018

Network and System Security

12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11058)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): NSS: International Conference on Network and System Security

Conference proceedings info: NSS 2018.

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XII
  2. Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain

    • Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding
    Pages 1-15
  3. Analysis on the Block Reward of Fork After Withholding (FAW)

    • Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu
    Pages 16-31
  4. Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs

    • Peter Ince, Joseph K. Liu, Peng Zhang
    Pages 32-45
  5. Burn After Reading: Expunging Execution Footprints of Android Apps

    • Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu
    Pages 46-63
  6. A Comprehensive Study of Permission Usage on Android

    • Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan et al.
    Pages 64-79
  7. Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices

    • Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam
    Pages 80-94
  8. Anonymous Attribute-Based Conditional Proxy Re-encryption

    • Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai
    Pages 95-110
  9. A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity

    • Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo
    Pages 111-124
  10. Multi-user Forward Secure Dynamic Searchable Symmetric Encryption

    • Qiao Wang, Yu Guo, Hejiao Huang, Xiaohua Jia
    Pages 125-140
  11. Towards Security Authentication for IoT Devices with Lattice-Based ZK

    • Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang
    Pages 141-150
  12. Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics

    • Paola Barra, Carmen Bisogni, Michele Nappi, Stefano Ricciardi
    Pages 160-173
  13. Walking on the Cloud: Gait Recognition, a Wearable Solution

    • Aniello Castiglione, Kim-Kwang Raymond Choo, Maria De Marsico, Alessio Mecca
    Pages 174-186
  14. EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control

    • Nesrine Kaaniche, Sana Belguith, Giovanni Russello
    Pages 187-201
  15. SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control

    • Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori
    Pages 202-211
  16. Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke

    • Silvio Barra, Mirko Marras, Gianni Fenu
    Pages 212-220
  17. Real-Time IoT Device Activity Detection in Edge Networks

    • Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma
    Pages 221-236
  18. Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi

    • Chen Yunfang, Zhu Yihong, Zhou Hao, Chen Wei, Zhang Wei
    Pages 237-250
  19. Analyzing the Communication Security Between Smartphones and IoT Based on CORAS

    • Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian D. Jensen
    Pages 251-265

Other Volumes

  1. Network and System Security

About this book



This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. 
The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.

Editors and Affiliations

  • The Hong Kong Polytechnic University, Hong Kong, China

    Man Ho Au, Xiapu Luo

  • The University of Hong Kong, Hong Kong, China

    Siu Ming Yiu

  • Guangzhou University, Guangzhou, China

    Jin Li

  • City University of Hong Kong, Hong Kong, China

    Cong Wang

  • University of Salerno and University of Naples Federico II, Fisciano, Italy

    Aniello Castiglione

  • CISPA Helmholtz Center i.G. GmbH, Saarbrücken, Germany

    Kamil Kluczniak

Bibliographic Information

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access