Network and System Security

6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

Editors:

ISBN: 978-3-642-34600-2 (Print) 978-3-642-34601-9 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Network Security I

    1. No Access

      Book Chapter

      Pages 1-14

      Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection

    2. No Access

      Book Chapter

      Pages 15-28

      On the Automated Analysis of Safety in Usage Control: A New Decidability Result

    3. No Access

      Book Chapter

      Pages 29-43

      Attestation of Mobile Baseband Stacks

    4. No Access

      Book Chapter

      Pages 44-57

      A Scalable Link Model for Local Optical Wireless Networks

  3. Network Security I

    1. No Access

      Book Chapter

      Pages 58-71

      Addressing Situational Awareness in Critical Domains of a Smart Grid

    2. No Access

      Book Chapter

      Pages 72-85

      Identifying OS Kernel Objects for Run-Time Security Analysis

    3. No Access

      Book Chapter

      Pages 86-99

      Background Transfer Method for Ubiquitous Computing

  4. Public Key Cryptography I

    1. No Access

      Book Chapter

      Pages 100-112

      Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption

    2. No Access

      Book Chapter

      Pages 113-125

      Proxy Signature Scheme Based on Isomorphisms of Polynomials

    3. No Access

      Book Chapter

      Pages 126-134

      Universal Designated Verifier Signcryption

  5. Privacy I

    1. No Access

      Book Chapter

      Pages 135-148

      A Bird’s Eye View on the I2P Anonymous File-Sharing Environment

    2. No Access

      Book Chapter

      Pages 149-165

      A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data

    3. No Access

      Book Chapter

      Pages 166-179

      Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity

  6. Authentication I

    1. No Access

      Book Chapter

      Pages 180-191

      Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks

    2. No Access

      Book Chapter

      Pages 192-205

      An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks

    3. No Access

      Book Chapter

      Pages 206-219

      The Performance of Public Key-Based Authentication Protocols

  7. Network Security II

    1. No Access

      Book Chapter

      Pages 220-232

      Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net

    2. No Access

      Book Chapter

      Pages 233-247

      Resilience Strategies for Networked Malware Detection and Remediation

    3. No Access

      Book Chapter

      Pages 248-262

      Detecting Spammers via Aggregated Historical Data Set

  8. System Security II

    1. No Access

      Book Chapter

      Pages 263-276

      Operating System Kernel Data Disambiguation to Support Security Analysis

previous Page of 2