Table of contents

  1. Front Matter
  2. NSS 2013 Regular Papers

    1. Network Security: Modeling and Evaluation

      1. Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro
        Pages 1-13
      2. Fudong Li, Nathan Clarke, Steven Furnell
        Pages 14-25
      3. Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi
        Pages 54-67
    2. Network Security: Security Protocols and Practice

      1. Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé
        Pages 80-93
      2. Sashi Gurung, Dan Lin, Anna Squicciarini, Elisa Bertino
        Pages 94-108
      3. Christoph Krauß, Volker Fusenig
        Pages 109-121
    3. Network Security: Network Attacks and Defense

      1. Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
        Pages 122-134
      2. James Kirrage, Asiri Rathnayake, Hayo Thielecke
        Pages 135-148
      3. Gabriel Cartier, Jean-François Cartier, José M. Fernandez
        Pages 149-163
      4. Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias
        Pages 164-177
    4. System Security: Malware and Intrusions

      1. Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo G. Bringas
        Pages 178-191
      2. Sebastian Vogl, Fatih Kilic, Christian Schneider, Claudia Eckert
        Pages 192-205
      3. Jonas Pfoh, Christian Schneider, Claudia Eckert
        Pages 206-219
      4. Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis
        Pages 220-235
    5. System Security: Applications Security

      1. George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis
        Pages 236-249
      2. Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis
        Pages 250-263

About these proceedings

Introduction

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Keywords

RFID attribute-based signature computer networks encryption vehicular ad-hoc networks

Editors and affiliations

  • Javier Lopez
    • 1
  • Xinyi Huang
    • 2
  • Ravi Sandhu
    • 3
  1. 1.Computer Science Department, ETSI InformaticaUniversity of MalagaMalagaSpain
  2. 2.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  3. 3.Institute for Cyber Security,University of Texas at San AntonioSan AntonioUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38630-5
  • Online ISBN 978-3-642-38631-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349