Cyberspace Safety and Security

4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings

Editors:

ISBN: 978-3-642-35361-1 (Print) 978-3-642-35362-8 (Online)
Download Book (17,831 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (37 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. CSS 2012 Regular Papers

    1. Session 4: Network and Cloud Security

      1. Book Chapter

        Pages 165-178

        A General Transformation from KP-ABE to Searchable Encryption

      2. Book Chapter

        Pages 179-193

        Supporting Security and Consistency for Cloud Database

      3. Book Chapter

        Pages 194-211

        Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme

      4. Book Chapter

        Pages 212-226

        Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic

      5. Book Chapter

        Pages 227-235

        SSH – Somewhat Secure Host

      Session 5: Security Models

      1. Book Chapter

        Pages 236-250

        Physical Access Control Administration Using Building Information Models

      2. Book Chapter

        Pages 251-264

        Multiple Factors Based Evaluation of Fingerprint Images Quality

      Session 1: Mobile Security

      1. Book Chapter

        Pages 1-10

        M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications

      2. Book Chapter

        Pages 11-20

        SafeCode – Safeguarding Security and Privacy of User Data on Stolen iOS Devices

      3. Book Chapter

        Pages 21-32

        Protection Aspects of Iconic Passwords on Mobile Devices

      4. Book Chapter

        Pages 33-47

        Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses

      Session 2: Cyberspace Attacks and Defense

      1. Book Chapter

        Pages 48-56

        A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering

      2. Book Chapter

        Pages 57-65

        Chattering-Free Terminal Sliding-Mode Observer for Anomaly Detection

      3. Book Chapter

        Pages 66-76

        Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA)

      4. Book Chapter

        Pages 77-92

        Improving Content Availability in the I2P Anonymous File-Sharing Environment

      Session 3: Security Applications and Systems

      1. Book Chapter

        Pages 93-107

        V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid

      2. Book Chapter

        Pages 108-122

        A Secure Architecture for Smart Meter Systems

      3. Book Chapter

        Pages 123-138

        A Novel Identity-Based Key Management and Encryption Scheme for Distributed System

      4. Book Chapter

        Pages 139-152

        An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics

      5. Book Chapter

        Pages 153-164

        Robust Authentication of Public Access Points Using Digital Certificates – A Novel Approach

previous Page of 2