Cyberspace Safety and Security

5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings

  • Guojun Wang
  • Indrakshi Ray
  • Dengguo Feng
  • Muttukrishnan Rajarajan
Conference proceedings

DOI: 10.1007/978-3-319-03584-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8300)

Table of contents

  1. Front Matter
  2. CSS 2013 Regular Papers

    1. Data and Applications Security

      1. Ang Mi, Weiping Wang, Shigeng Zhang, Hong Song
        Pages 29-39
      2. Jiangxiao Zhang, Zhoujun Li, Hua Guo
        Pages 40-51
      3. Chong Fu, Tao Wang, Zhao-yu Meng, Jun-xin Chen, Hong-feng Ma
        Pages 52-66
      4. Wencheng Yang, Jiankun Hu, Song Wang, Jucheng Yang
        Pages 81-91
      5. Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng
        Pages 92-103
    2. Network and Communications Security

      1. Lin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jin-Shu Su
        Pages 104-116
      2. Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus
        Pages 132-150
      3. Robert Koch, Mario Golling, Gabi Dreo Rodosek
        Pages 151-170
      4. Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili
        Pages 183-197
      5. Natsuki Kimura, Noriaki Yoshiura
        Pages 198-212
      6. Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou
        Pages 213-227
      7. Christian Callegari, Stefano Giordano, Susanna Mannella, Michele Pagano
        Pages 228-242

About these proceedings

Introduction

This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.

Keywords

attacks authentication encryption mobile devices privacy

Editors and affiliations

  • Guojun Wang
    • 1
  • Indrakshi Ray
    • 2
  • Dengguo Feng
    • 3
  • Muttukrishnan Rajarajan
    • 4
  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaP.R. China
  2. 2.Computer Science DepartmentColorado State UniversityFort CollinsUSA
  3. 3.Chinese Academy of Sciences, Institute of SoftwareBeijingP.R. China
  4. 4.information Security GroupCity University LondonLondonUK

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-03583-3
  • Online ISBN 978-3-319-03584-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349