Free shipping on orders over $99
Network and System Security

Network and System Security

8th International Conference, Nss 2014, Xi' An, China, October 15-17, 2014. Proceedings

by Man-Ho HoBarbara Carminati and C. C. Jay Kuo
Paperback
Publication Date: 12/09/2014

Share This Book:

  $84.99
or 4 easy payments of $21.25 with
afterpay
Cloud Computing.- An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.- Adopting Provenance-Based Access Control in OpenStack Cloud IaaS.- Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.- A Formal Model for Isolation Management in Cloud Infrastructure-asa- Service.- Access Control.- Extending OpenStack Access Control with Domain Trust.- Hierarchical Solution for Access Control and Authentication in Software Defined Networks.- A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.- Network Security.-psOBJ: Defending against Traffic Analysis with pseudo-Objects.- Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS.- Revisiting Node Injection of P2P Botnet.- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.- Security Analysis.- Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack.- A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.- Cryptanalysis on the Authenticated Cipher Sablier.- A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique.- Security Analysis and Improvement of Femtocell Access Control.- Public Key Cryptography.- Identity Based Threshold Ring Signature from Lattices.- Identity-Based Transitive Signcryptio.- GO-ABE: Group-Oriented Attribute-Based Encryption.- Jhanwar-Barua's Identity-Based Encryption Revisited.- Lightweight Universally Composable Adaptive Oblivious Transfer.- Certificate-Based Conditional Proxy Re-Encryption.- A Secure Obfuscator for Encrypted Blind Signature Functionality.- Attribute-Based Signing Right Delegation.- System Security.- Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios.- iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.- Formal Verification of Finite State Transactional Security Policy.- Privacy-Preserving Systems and Bio-metrics.- Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features.- Privacy Preserving Biometrics-Based and User Centric Authentication Protocol.- A Dynamic Matching Secret Handshake Scheme without Random Oracles.- Formal Analysis of DAA-Related APIs in TPM 2.0.- Key Management and Distribution.- eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy.- Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.- A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.- Short Papers.- Rational Secure Two-party Computation in Social Cloud.- How to Evaluate Trust Using MMT.- A Proposed Approach to Compound File Fragment Identification.- Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework.- A New Approach to Executable File Fragment Detection in Network Forensics.- Tighter Security Bound of MIBS Block Cipher against Differential Attack.- A New Multivariate Based Threshold Ring Signature Scheme.- Capturing Android Malware Behaviour Using System Flow Graph.- Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD.- A New Public Key Encryption with Equality Test.- A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers.- Multi-domain Direct Anonymous Attestation Scheme from Pairings.
ISBN:
9783319116976
9783319116976
Category:
Business applications
Format:
Paperback
Publication Date:
12-09-2014
Language:
English
Publisher:
Springer
Country of origin:
United States
Dimensions (mm):
235x155mm
Weight:
8.89kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Network and System Security.