Cyberspace Safety and Security

5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings

ISBN: 978-3-319-03583-3 (Print) 978-3-319-03584-0 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. CSS 2013 Regular Papers

    1. Data and Applications Security

      1. No Access

        Book Chapter

        Pages 1-13

        A Crawler Guard for Quickly Blocking Unauthorized Web Robot

      2. No Access

        Book Chapter

        Pages 14-28

        Privacy Preserving for Location-Based Services Using Location Transformation

      3. No Access

        Book Chapter

        Pages 29-39

        Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux

      4. No Access

        Book Chapter

        Pages 40-51

        Multiple-Bank E-Cash without Random Oracles

      5. No Access

        Book Chapter

        Pages 52-66

        A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy

      6. No Access

        Book Chapter

        Pages 67-80

        Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics

      7. No Access

        Book Chapter

        Pages 81-91

        Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures

      8. No Access

        Book Chapter

        Pages 92-103

        Towards a Security-Enhanced Firewall Application for OpenFlow Networks

      Network and Communications Security

      1. No Access

        Book Chapter

        Pages 104-116

        Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method

      2. No Access

        Book Chapter

        Pages 117-131

        Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows

      3. No Access

        Book Chapter

        Pages 132-150

        Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks

      4. No Access

        Book Chapter

        Pages 151-170

        Geolocation and Verification of IP-Addresses with Specific Focus on IPv6

      5. No Access

        Book Chapter

        Pages 171-182

        Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks

      6. No Access

        Book Chapter

        Pages 183-197

        Alert Correlation Algorithms: A Survey and Taxonomy

      7. No Access

        Book Chapter

        Pages 198-212

        Construction and Verification of Mobile Ad Hoc Network Protocols

      8. No Access

        Book Chapter

        Pages 213-227

        Zero-Day Traffic Identification

      9. No Access

        Book Chapter

        Pages 228-242

        Design and Implementation of a Testbed for the Security Assessment of MANETs

      10. No Access

        Book Chapter

        Pages 243-257

        A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology

      11. No Access

        Book Chapter

        Pages 258-271

        Anonymous Identity-Based Broadcast Encryption with Adaptive Security

      12. No Access

        Book Chapter

        Pages 272-281

        Hierarchical Identity-Based Signature with Short Public Keys

previous Page of 2