Network and System Security 2015 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


9th NSS 2015: New York, NY, USA

jump to- Wireless Security and Privacy
- Smartphone Security
- Systems Security
- Application Security
- Security Management
- Applied Cryptography
- Cryptosystems
- Short Papers: Cryptographic Mechanisms
- Short Papers: Security Mechanisms
- Short Papers: Mobile and Cloud Security
- Short Papers: Application and Network Security

- > Home > Conferences and Workshops > NSS
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang:
Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings. Lecture Notes in Computer Science 9408, Springer 2015, ISBN 978-3-319-25644-3
Wireless Security and Privacy

Wei Wang, Mikhail Istomin, Jeffrey Bickford:
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks. 3-17

Jongho Won, Elisa Bertino:
Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. 18-31

Brian Ricks, Patrick Tague:
Isolation of Multiple Anonymous Attackers in Mobile Networks. 32-45

Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. 46-59
Smartphone Security
Systems Security

Devu Manikantan Shila, Vivek Venugopalan
, Cameron D. Patterson:
Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs. 95-111

Javid Habibi, Ajay Panicker, Aditi Gupta, Elisa Bertino:
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices. 112-129

Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Ríha, Vashek Matyas:
Service in Denial - Clouds Going with the Winds. 130-143
Application Security

Weizhi Meng
:
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. 147-161

Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni:
Indicators of Malicious SSL Connections. 162-175

Jinwei Xu, Jiankun Hu
:
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing. 176-187
Security Management
Applied Cryptography

Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. 239-253

Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
GP-ORAM: A Generalized Partition ORAM. 268-282

Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Anonymous Evaluation System. 283-299
Cryptosystems

Fuqun Wang, Kunpeng Wang, Bao Li:
An Efficient Leveled Identity-Based FHE. 303-315

Ashish Jain
, Narendra S. Chaudhari:
Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks. 316-330

Xiaoshuang Ma, Kexin Qiao
:
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. 331-344

Jiageng Chen
, Atsuko Miyaji
, Chunhua Su, Liang Zhao:
A New Statistical Approach for Integral Attack. 345-356
Short Papers: Cryptographic Mechanisms

Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad:
Foundations of Optical Encryption: A Candidate Short-Key Scheme. 359-367

Duane Wilson, Giuseppe Ateniese:
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. 368-375

Atsuko Miyaji
, Shohei Nishida:
A Scalable Multiparty Private Set Intersection. 376-385

Zhiguo Wan, Robert H. Deng
, David Lee:
Electronic Contract Signing Without Using Trusted Third Party. 386-394

Teng Wu, Guang Gong:
New Message Authentication Code Based on APN Functions and Stream Ciphers. 395-402
Short Papers: Security Mechanisms

Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen
, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. 405-417

Javier Baliosian, Ana R. Cavalli
:
An Abstraction for the Interoperability Analysis of Security Policies. 418-427

Jean-Michel Cioranesco, Craig Hampel, Guilherme Ozari de Almeida, Rodrigo Portella do Canto:
Cryptographically Secure On-Chip Firewalling. 428-438

Christian Callegari
, Stefano Giordano
, Michele Pagano
:
Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection. 439-446
Short Papers: Mobile and Cloud Security

Chao Li
, Balaji Palanisamy:
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. 449-458

Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang
:
A Study of Network Domains Used in Android Applications. 467-474

Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford:
Detecting Malicious Activity on Smartphones Using Sensor Measurements. 475-487

Abdulaziz Aldribi, Issa Traoré:
A Game Theoretic Framework for Cloud Security Transparency. 488-500
Short Papers: Application and Network Security

Hafizah Mansor
, Konstantinos Markantonakis
, Raja Naeem Akram
, Keith Mayes:
Let's Get Mobile: Secure FOTA for Automotive System. 503-510

P. Krishnan, Navjot Singh:
VICI: Visual Caller Identification for Contact Center Applications. 511-518

Ross K. Gegan, Rennie Archibald, Matthew K. Farrens, Dipak Ghosal:
Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System. 519-530

Hang Cai, Krishna K. Venkatasubramanian:
Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks. 531-539

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






