跳至内容
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings 線上預覽
關閉線上預覽
正在查...

Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings

作者: Javier Lopez; Xinyi Huang; Ravi Sandhu
出版商: Berlin ; New York : Springer, ©2013.
叢書: Lecture notes in computer science, 7873.; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   電子書 : 文獻 : 會議刊物 : 英語所有版本和格式的總覽
資料庫:WorldCat
提要:
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation;  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Congresses
Electronic books
Conference papers and proceedings
Ebook
其他的實體格式: Printed edition:
資料類型: 會議刊物, 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Javier Lopez; Xinyi Huang; Ravi Sandhu
ISBN: 9783642386312 3642386318
OCLC系統控制編碼: 847520075
注意: International conference proceedings.
Includes author index.
描述: 1 online resource.
内容: NSS 2013 Regular Papers. Network Security: Modeling and Evaluation. Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study / Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro --
A Technology Independent Security Gateway for Real-Time Multimedia Communication / Fudong Li, Nathan Clarke, Steven Furnell --
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network / Y. Sreenivasa Rao, Ratna Dutta --
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection / Yuxin Meng, Wenjuan Li, Lam-for Kwok --
Model the Influence of Sybil Nodes in P2P Botnets / Tianzuo Wang [and others] --
Network Security: Security Protocols and Practice. A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture / Mahdi Aiash --
The OffPAD: Requirements and Usage / Kent Are Varmedal [and others] --
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks / Sashi Gurung [and others] --
Using Trusted Platform Modules for Location Assurance in Cloud Networking / Christoph Krauß, Volker Fusenig. Network Security: Network Attacks and Defense. Tracing Sources of Anonymous Slow Suspicious Activities / Harsha K. Kalutarage [and others] --
Static Analysis for Regular Expression Denial-of-Service Attacks / James Kirrage, Asiri Rathnayake, Hayo Thielecke --
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding / Gabriel Cartier, Jean-François Cartier, José M. Fernandez --
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning / Tamas K. Lengyel [and others] --
System Security: Malware and Intrusions. MADS: Malicious Android Applications Detection through String Analysis / Borja Sanz [and others] --
X-TIER: Kernel Module Injection / Sebastian Vogl [and others] --
Leveraging String Kernels for Malware Detection / Jonas Pfoh, Christian Schneider, Claudia Eckert --
Insiders Trapped in the Mirror Reveal Themselves in Social Media / Miltiadis Kandias [and others]. System Security: Applications Security. On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework / George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis --
Using the Smart Card Web Server in Secure Branchless Banking / Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis --
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach / Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto --
Efficient and Private Three-Party Publish/Subscribe / Giovanni Di Crescenzo [and others] --
System Security: Security Algorithms and Systems. Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks / Aditi Gupta [and others] --
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform / Wei Feng [and others] --
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines / Suaad Alarifi, Stephen Wolthusen --
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms / Benoît Bertholon, Sébastien Varrette, Pascal Bouvry. Cryptographic Algorithms I. Forward Secure Certificateless Proxy Signature Scheme / Jiguo Li, Yanqiong Li, Yichen Zhang --
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP / Hongda Li, Qihua Niu, Bei Liang --
On the Security of an Efficient Attribute-Based Signature / Yan Zhang [and others] --
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method / Yao Lu, Rui Zhang, Dongdai Lin --
Cryptographic Algorithms II. Performance Prediction Model for Block Ciphers on GPU Architectures / Naoki Nishikawa [and others] --
Threshold-Oriented Optimistic Fair Exchange / Yang Wang [and others] --
Secure Storage and Fuzzy Query over Encrypted Databases / Zheli Liu [and others] --
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation / Yunhui Zhuang [and others]. Privacy. Privacy Preserving Context Aware Publish Subscribe Systems / Mohamed Nabeel [and others] --
A New Unpredictability-Based RFID Privacy Model / Anjia Yang [and others] --
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption / Florian Weingarten [and others] --
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting / Weijia Wang, Lei Hu, Yong Li --
Key Agreement and Distribution. Light Weight Network Coding Based Key Distribution Scheme for MANETs / Jianwei Liu [and others] Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network / Chao Wang [and others] Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards / Shaohua Tang, Lingling Xu --
An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks / Elisavet Konstantinou. NSS 2013 Short Papers. Human Identification with Electroencephalogram (EEG) for the Future Network Security / Xu Huang [and others] Building Better Unsupervised Anomaly Detector with S-Transform / Sirikarn Pukkawanna [and others] Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs / Jing Chen [and others] Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens / Kannan Karthik On the Use of Key Assignment Schemes in Authentication Protocols / James Alderman, Jason Crampton On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems / Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador Security Authentication of AODV Protocols in MANETs / Ahmad Alomari --
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach / Markus Gruber [and others]. Towards a Privacy-Preserving Solution for OSNs / Qiang Tang --
Measuring and Comparing the Protection Quality in Different Operating Systems / Zhihui Han [and others] --
Collusion-Resistant Domain-Specific Pseudonymous Signatures / Julien Bringer, Hervé Chabanne, Alain Patey --
On the Applicability of Time-Driven Cache Attacks on Mobile Devices / Raphael Spreitzer, Thomas Plos --
Ancestor Excludable Hierarchical ID-Based Encryption Revisited / Fan Zhang, Hua Guo, Zhoujun Li --
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks / Yan Li [and others] --
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks / Jia Hu, Hui Lin, Li Xu --
Distributed and Anonymous Publish-Subscribe / Jörg Daubert [and others] --
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs / Giovanni Agosta [and others]. NSS 2013 Industrial Track Papers. Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments / Shun-Wen Hsiao [and others] --
Filtering Trolling Comments through Collective Classification / Jorge de-la-Peña-Sordo [and others] Security Analysis of Touch Inputted Passwords / Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto --
A Pairing-Free Identity Based Authentication Framework for Cloud Computing / Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay --
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols / Alessandro Armando, Roberto Carbone, Luca Zanetti --
Towards a More Secure Apache Hadoop HDFS Infrastructure / Jason Cohen, Subatra Acharya --
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR / Mahdi Aiash --
A Comprehensive Access Control System for Scientific Applications / Muhammad I. Sarfraz [and others] --
Partial Fingerprint Reconstruction with Improved Smooth Extension / Wei Zhou [and others] --
Modeling and Analysis for Thwarting Worm Propagation in Email Networks / Sheng Wen, Yang Xiang, Wanlei Zhou --
On Secure and Power-Efficient RFID-Based Wireless Body Area Network / Sana Ullah, Waleed Alsalih --
Towards Authenticated Objects / Daniele Midi, Ashish Kundu, Elisa Bertino --
A Finger-Vein Based Cancellable Bio-cryptosystem / Wencheng Yang, Jiankun Hu, Song Wang.
叢書名: Lecture notes in computer science, 7873.; LNCS sublibrary., SL 4,, Security and cryptology.
其他題名: NSS 2013
責任: Javier Lopez, Xinyi Huang, Ravi Sandhu (eds.).

摘要:

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


Primary Entity

<http://www.worldcat.org/oclc/847520075> # Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "847520075" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1371208640#Place/berlin> ; # Berlin
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/e_commerce_e_business> ; # e-Commerce/e-business.
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Topic/computer_security> ; # Computer Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/data_protection> ; # Data protection.
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/information_systems> ; # Information Systems.
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/systems_and_data_security> ; # Systems and Data Security.
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/computer_communication_networks> ; # Computer Communication Networks.
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/computer_science> ; # Computer science.
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems.
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1371208640#Thing/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:alternateName "NSS 2013" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1371208640#Person/huang_xinyi> ; # Xinyi Huang
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1371208640#Person/lopez_javier> ; # Javier Lopez
    schema:contributor <http://viaf.org/viaf/306106507> ; # Ravi Sandhu
    schema:copyrightYear "2013" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/1371208640#Meeting/international_conference_on_network_and_system_security_7th_2013_madrid_spain> ; # International Conference on Network and System Security (7th : 2013 : Madrid, Spain)
    schema:datePublished "2013" ;
    schema:description "This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution)."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1371208640> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Ebook"@en ;
    schema:genre "Congresses"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1371208640#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1371208640#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1371208640#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1371208640#CreativeWork/> ;
    schema:name "Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings"@en ;
    schema:productID "847520075" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/847520075#PublicationEvent/berlin_new_york_springer_2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1371208640#Agent/springer> ; # Springer
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3093044> ;
    schema:url <http://dx.doi.org/10.1007/978-3-642-38631-2> ;
    schema:workExample <http://worldcat.org/isbn/9783642386312> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-642-38631-2> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/847520075> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Meeting/international_conference_on_network_and_system_security_7th_2013_madrid_spain> # International Conference on Network and System Security (7th : 2013 : Madrid, Spain)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/1371208640#Place/madrid_spain> ; # Madrid, Spain)
    schema:name "International Conference on Network and System Security (7th : 2013 : Madrid, Spain)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Person/huang_xinyi> # Xinyi Huang
    a schema:Person ;
    schema:familyName "Huang" ;
    schema:givenName "Xinyi" ;
    schema:name "Xinyi Huang" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Person/lopez_javier> # Javier Lopez
    a schema:Person ;
    schema:familyName "Lopez" ;
    schema:givenName "Javier" ;
    schema:name "Javier Lopez" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Place/madrid_spain> # Madrid, Spain)
    a schema:Place ;
    schema:name "Madrid, Spain)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/847520075> ; # Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/847520075> ; # Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/847520075> ; # Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/computer_communication_networks> # Computer Communication Networks.
    a schema:Thing ;
    schema:name "Computer Communication Networks." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/computer_science> # Computer science.
    a schema:Thing ;
    schema:name "Computer science." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Thing ;
    schema:name "Data encryption (Computer science)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/data_protection> # Data protection.
    a schema:Thing ;
    schema:name "Data protection." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/e_commerce_e_business> # e-Commerce/e-business.
    a schema:Thing ;
    schema:name "e-Commerce/e-business." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/information_systems> # Information Systems.
    a schema:Thing ;
    schema:name "Information Systems." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/management_of_computing_and_information_systems> # Management of Computing and Information Systems.
    a schema:Thing ;
    schema:name "Management of Computing and Information Systems." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Thing/systems_and_data_security> # Systems and Data Security.
    a schema:Thing ;
    schema:name "Systems and Data Security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1371208640#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/306106507> # Ravi Sandhu
    a schema:Person ;
    schema:familyName "Sandhu" ;
    schema:givenName "Ravi" ;
    schema:name "Ravi Sandhu" ;
    .

<http://worldcat.org/entity/work/data/1371208640#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/847520075> ; # Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
    .

<http://worldcat.org/isbn/9783642386312>
    a schema:ProductModel ;
    schema:isbn "3642386318" ;
    schema:isbn "9783642386312" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/847520075> ; # Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/847520075>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/847520075> ; # Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings
    schema:dateModified "2016-07-12" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.