Network and system security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings /: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings. (2016)
- Record Type:
- Book
- Title:
- Network and system security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings /: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings. (2016)
- Main Title:
- Network and system security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings
- Other Titles:
- NSS 2016
- Further Information:
- Note: Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.).
- Editors:
- Chen, Jiageng
Piuri, Vincenzo
Su, Chunhua
Yung, Moti - Other Names:
- International Conference on Network and System Security, 10th
- Contents:
- Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel FreeInvited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (xiv, 540 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer security
Computer Science
Systems and Data Security
Data Encryption
Computer Communication Networks
Management of Computing and Information Systems
Computers and Society
Information Systems and Communication Service
Computers -- Security -- General
Computers -- Hardware -- Network Hardware
Business & Economics -- Information Management
Computers -- Social Aspects -- General
Computers -- Online Services -- General
Coding theory & cryptology
Network hardware
Information architecture
Ethical & social aspects of IT
Computer networking & communications
Computer security
Data encryption (Computer science)
Computer Communication Networks
Information Systems
Computer security
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319462981
3319462989
3319462970
9783319462974 - Related ISBNs:
- 9783319462974
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed October 5, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.356848
- Ingest File:
- 01_317.xml