Advertisement

Network and System Security

11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings

  • Zheng Yan
  • Refik Molva
  • Wojciech Mazurczyk
  • Raimo Kantola

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10394)

Also part of the Security and Cryptology book sub series (LNSC, volume 10394)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Cloud and IoT Security

    1. Front Matter
      Pages 1-1
    2. Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola et al.
      Pages 19-30
    3. Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi
      Pages 31-45
    4. Igor Kabashkin
      Pages 59-70
  3. Network Security

    1. Front Matter
      Pages 71-71
    2. Ahmad M. K. Nasser, Di Ma, Sam Lauzon
      Pages 73-86
    3. Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu
      Pages 99-111
    4. Saeed Shafieian, Daniel Smith, Mohammad Zulkernine
      Pages 112-127
    5. Hanlu Chen, Yulong Fu, Zheng Yan
      Pages 128-142
  4. Platform and Hardware Security

    1. Front Matter
      Pages 143-143
    2. Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue
      Pages 145-159
    3. Patrick Eitschberger, Jörg Keller, Simon Holmbacka
      Pages 160-168
    4. Jiayuan Zhang, Yao Yao, Xiaoqi Li, Jian Xie, Gaofei Wu
      Pages 169-183
    5. Amirhossein Gharib, Ali Ghorbani
      Pages 184-198
    6. Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li
      Pages 199-213
  5. Crypto and Others

    1. Front Matter
      Pages 215-215
    2. Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong
      Pages 217-232
    3. Elena Reshetova, Filippo Bonazzi, N. Asokan
      Pages 233-247
    4. Dang Nguyen, Dat Tran, Wanli Ma, Khoa Nguyen
      Pages 248-256
    5. Tahmina Ahmed, Ravi Sandhu
      Pages 257-272
    6. Naoki Nishikawa, Hideharu Amano, Keisuke Iwai
      Pages 273-287
  6. Authentication and Key Management

  7. International Workshop on Security Measurements of Cyber Networks (SMCN-2017)

    1. Front Matter
      Pages 347-348
    2. Yukun Zheng, Kun Lv, Changzhen Hu
      Pages 349-358
    3. Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao
      Pages 359-372
    4. Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu
      Pages 373-385
    5. Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang
      Pages 386-398
    6. Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang
      Pages 413-426
    7. Chensi Wu, Yuqing Zhang, Ying Dong
      Pages 439-449
    8. Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu et al.
      Pages 450-463
    9. Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen
      Pages 486-496
  8. International Workshop on Security in Big Data (SECBD-2017)

    1. Front Matter
      Pages 497-498
    2. Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian
      Pages 499-509
  9. 3rd International Workshop on 5G Security and Machine Learning (IW5GS-2017)

    1. Front Matter
      Pages 519-520
    2. Markku Vajaranta, Joona Kannisto, Jarmo Harju
      Pages 521-530
    3. Mohsin Khan, Valtteri Niemi
      Pages 544-554

About these proceedings

Introduction

This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83 initial submissions. The papers are organized in topical sections on Cloud and IoT Security; Network Security; Platform and Hardware Security; Crypto and Others; and Authentication and Key Management. This volume also contains 35 contributions of the following workshops: Security Measurements of Cyber Networks (SMCN-2017); Security in Big Data (SECBD-2017); 5G Security and Machine Learning (IW5GS-2017); of the Internet of Everything (SECIOE-2017).

Keywords

security trust management privacy preservation defense system cryptography authentication cloud security data security network security key management platform security intrusion detection blockchain internet artificial intelligence computer crime telecommunication networks privacy world wide web data mining

Editors and affiliations

  • Zheng Yan
    • 1
  • Refik Molva
    • 2
  • Wojciech Mazurczyk
    • 3
  • Raimo Kantola
    • 4
  1. 1.Xidian UniversityXi’anChina
  2. 2.EurecomSophia Antipolos, ValbonneFrance
  3. 3.Warsaw University of TechnologyWarsawPoland
  4. 4.Aalto UniversityEspooFinland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-64701-2
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-64700-5
  • Online ISBN 978-3-319-64701-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site