Network and System Security

6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

  • Li Xu
  • Elisa Bertino
  • Yi Mu
Conference proceedings NSS 2012

DOI: 10.1007/978-3-642-34601-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7645)

Table of contents (39 papers)

  1. Front Matter
  2. Network Security I

    1. Attestation of Mobile Baseband Stacks
      Steffen Wagner, Sascha Wessel, Frederic Stumpf
      Pages 29-43
    2. A Scalable Link Model for Local Optical Wireless Networks
      Tae-Gyu Lee, Gi-Soo Chung
      Pages 44-57
    3. Identifying OS Kernel Objects for Run-Time Security Analysis
      Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, Mohamed Almorsy
      Pages 72-85
    4. Background Transfer Method for Ubiquitous Computing
      Tae-Gyu Lee, Gi-Soo Chung
      Pages 86-99
  3. Public Key Cryptography I

    1. Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption
      Shengli Liu, Fangguo Zhang, Kefei Chen
      Pages 100-112
    2. Proxy Signature Scheme Based on Isomorphisms of Polynomials
      Shaohua Tang, Lingling Xu
      Pages 113-125
    3. Universal Designated Verifier Signcryption
      Fei Tang, Changlu Lin, Pinhui Ke
      Pages 126-134
  4. Privacy I

    1. A Bird’s Eye View on the I2P Anonymous File-Sharing Environment
      Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor
      Pages 135-148
    2. A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data
      Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani
      Pages 149-165
    3. Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity
      Alif Wahid, Christopher Leckie, Chenfeng Zhou
      Pages 166-179
  5. Authentication I

  6. Network Security II

    1. Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net
      Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu
      Pages 220-232
    2. Resilience Strategies for Networked Malware Detection and Remediation
      Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, Alberto Schaeffer-Filho
      Pages 233-247
    3. Detecting Spammers via Aggregated Historical Data Set
      Eitan Menahem, Rami Pusiz, Yuval Elovici
      Pages 248-262

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.

The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Keywords

attacks authentication protocols cloud computing cryptanalysis wireless networks

Editors and affiliations

  • Li Xu
    • 1
  • Elisa Bertino
    • 2
  • Yi Mu
    • 3
  1. 1.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  2. 2.Department of Computer Science, CERIAS and Cyber CenterPurdue UniversityWest LafayetteUSA
  3. 3.School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34600-2
  • Online ISBN 978-3-642-34601-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349