Cyberspace Safety and Security

5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings

  • Guojun Wang
  • Indrakshi Ray
  • Dengguo Feng
  • Muttukrishnan Rajarajan
Conference proceedings

DOI: 10.1007/978-3-319-03584-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8300)

Table of contents (36 papers)

  1. Front Matter
  2. CSS 2013 Regular Papers

    1. Data and Applications Security

      1. Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux
        Ang Mi, Weiping Wang, Shigeng Zhang, Hong Song
        Pages 29-39
      2. Multiple-Bank E-Cash without Random Oracles
        Jiangxiao Zhang, Zhoujun Li, Hua Guo
        Pages 40-51
      3. A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy
        Chong Fu, Tao Wang, Zhao-yu Meng, Jun-xin Chen, Hong-feng Ma
        Pages 52-66
      4. Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures
        Wencheng Yang, Jiankun Hu, Song Wang, Jucheng Yang
        Pages 81-91
      5. Towards a Security-Enhanced Firewall Application for OpenFlow Networks
        Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng
        Pages 92-103
    2. Network and Communications Security

      1. Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method
        Lin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jin-Shu Su
        Pages 104-116
      2. Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks
        Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus
        Pages 132-150
      3. Geolocation and Verification of IP-Addresses with Specific Focus on IPv6
        Robert Koch, Mario Golling, Gabi Dreo Rodosek
        Pages 151-170
      4. Alert Correlation Algorithms: A Survey and Taxonomy
        Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili
        Pages 183-197
      5. Construction and Verification of Mobile Ad Hoc Network Protocols
        Natsuki Kimura, Noriaki Yoshiura
        Pages 198-212
      6. Zero-Day Traffic Identification
        Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou
        Pages 213-227
      7. Design and Implementation of a Testbed for the Security Assessment of MANETs
        Christian Callegari, Stefano Giordano, Susanna Mannella, Michele Pagano
        Pages 228-242

About these proceedings

Introduction

This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.

Keywords

attacks authentication encryption mobile devices privacy

Editors and affiliations

  • Guojun Wang
    • 1
  • Indrakshi Ray
    • 2
  • Dengguo Feng
    • 3
  • Muttukrishnan Rajarajan
    • 4
  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaP.R. China
  2. 2.Computer Science DepartmentColorado State UniversityFort CollinsUSA
  3. 3.Chinese Academy of Sciences, Institute of SoftwareBeijingP.R. China
  4. 4.information Security GroupCity University LondonLondonUK

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-03583-3
  • Online ISBN 978-3-319-03584-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349