Network and System Security

6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

  • Li Xu
  • Elisa Bertino
  • Yi Mu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7645)

Table of contents

  1. Front Matter
  2. Network Security I

  3. Network Security I

    1. Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, Mohamed Almorsy
      Pages 72-85
    2. Tae-Gyu Lee, Gi-Soo Chung
      Pages 86-99
  4. Public Key Cryptography I

    1. Shengli Liu, Fangguo Zhang, Kefei Chen
      Pages 100-112
    2. Shaohua Tang, Lingling Xu
      Pages 113-125
    3. Fei Tang, Changlu Lin, Pinhui Ke
      Pages 126-134
  5. Privacy I

    1. Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor
      Pages 135-148
    2. Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani
      Pages 149-165
    3. Alif Wahid, Christopher Leckie, Chenfeng Zhou
      Pages 166-179
  6. Authentication I

  7. Network Security II

    1. Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu
      Pages 220-232
    2. Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, Alberto Schaeffer-Filho
      Pages 233-247
    3. Eitan Menahem, Rami Pusiz, Yuval Elovici
      Pages 248-262

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.

The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Keywords

attacks authentication protocols cloud computing cryptanalysis wireless networks

Editors and affiliations

  • Li Xu
    • 1
  • Elisa Bertino
    • 2
  • Yi Mu
    • 3
  1. 1.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  2. 2.Department of Computer Science, CERIAS and Cyber CenterPurdue UniversityWest LafayetteUSA
  3. 3.School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-34601-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34600-2
  • Online ISBN 978-3-642-34601-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book