The Resource Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings, edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang

Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings, edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang

Label
Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings
Title
Network and system security
Title remainder
9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings
Statement of responsibility
edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
Creator
Contributor
Editor
Subject
Genre
Language
eng
Additional physical form
Also published electronically
Cataloging source
StDuBDS
Dewey number
005.8
Illustrations
illustrations
Index
no index present
Literary form
non fiction
Series statement
Lecture notes in computer science,
Series volume
9408
Label
Network and system security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings, edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
Publication
Note
Formerly CIP.
Bibliography note
Includes bibliographical references and author index
http://library.link/vocab/branchCode
  • mel
Carrier category
volume
Carrier MARC source
rdacarrier
Content category
text
Content type MARC source
rdacontent
Contents
  • Machine generated contents note: Wireless Security and Privacy -- Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks / Jeffrey Bickford -- Distance-Based Trustworthiness Assessment for Sensors in Wireless Sensor Networks / Elisa Bertino -- Isolation of Multiple Anonymous Attackers in Mobile Networks / Patrick Tague -- No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position / Antonio Villani -- Smartphone Security -- Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach / Pedro Peris-Lopez -- Android Botnets: What URLs are Telling Us / Ali Akbar Ghorbani -- Systems Security -- Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs / Cameron D. Patterson -- DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices / Elisa Bertino -- Service in Denial -- Clouds Going with the Winds / Vashek Matyas -- Application Security --
  • Contents note continued: RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory / Weizhi Meng -- Indicators of Malicious SSL Connections / Damiano Bolzoni -- Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing / Jiankun Hu -- Security Management -- A Framework for Policy Similarity Evaluation and Migration Based on Change Detection / David Lorenzi -- MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust / Ravi Sandhu -- Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing / Ussama Yakub -- Applied Cryptography -- CLKS: Certificateless Keyword Search on Encrypted Data / Aytac Azgin -- Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control / Rui Zhang -- GP-ORAM: A Generalized Partition ORAM / Daji Qiao -- Anonymous Evaluation System / Miroslaw Kutylowski -- Cryptosystems --
  • Contents note continued: An Efficient Leveled Identity-Based FHE / Bao Li -- Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks / Narendra S. Chaudhari -- Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher / Kexin Qiao -- A New Statistical Approach for Integral Attack / Liang Zhao -- Short Papers: Cryptographic Mechanisms -- Foundations of Optical Encryption: A Candidate Short-Key Scheme / Shahab Etemad -- From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain / Giuseppe Ateniese -- A Scalable Multiparty Private Set Intersection / Shohei Nishida -- Electronic Contract Signing Without Using Trusted Third Party / David Lee -- New Message Authentication Code Based on APN Functions and Stream Ciphers / Guang Gong -- Short Papers: Security Mechanisms -- Assessing Attack Surface with Component-Based Package Dependency / Jing Jin --
  • Contents note continued: An Abstraction for the Interoperability Analysis of Security Policies / Ana Cavalli -- Cryptographically Secure On-Chip Firewalling / Rodrigo Portella do Canto -- Enforcing Privacy in Distributed Multi-domain Network Anomaly Detection / Michele Pagano -- Short Papers: Mobile and Cloud Security -- De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems / Balaji Palanisamy -- First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks / Sheng Wen -- A Study of Network Domains Used in Android Applications / Shengzhi Zhang -- Detecting Malicious Activity on Smartphones Using Sensor Measurements / Jeffrey Bickford -- A Game Theoretic Framework for Cloud Security Transparency / Issa Traore -- Short Papers: Application and Network Security -- Let's Get Mobile: Secure FOTA for Automotive System / Keith Mayes -- VICI: Visual Caller Identification for Contact Center Applications / Navjot Singh --
  • Contents note continued: Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System / Dipak Ghosal -- Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks / Krishna K. Venkatasubramanian
Control code
000056957371
Dimensions
24 cm
Extent
xiv, 539 pages
Isbn
9783319256443
Isbn Type
(pbk.)
Lccn
2015952062
Media category
unmediated
Media MARC source
rdamedia
Other physical details
illustrations
http://library.link/vocab/recordID
.b34122552
System control number
ci34122552

Library Locations

    • Deakin University Library - Melbourne Burwood CampusBorrow it
      221 Burwood Highway, Burwood, Victoria, 3125, AU
      -37.846510 145.115099
Processing Feedback ...