default search action
CSS 2012: Melbourne, Australia
- Yang Xiang, Javier López, C.-C. Jay Kuo, Wanlei Zhou:
Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Lecture Notes in Computer Science 7672, Springer 2012, ISBN 978-3-642-35361-1 [contents]
CSS 2012 Regular Papers
- Fengling Han, Ron G. van Schyndel:
M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications. 1-10 - Avinash Srinivasan, Jie Wu:
SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices. 11-20 - Alexandre Melo Braga, Rafael Cividanes, Ismael M. A. Ávila, Cláudia de Andrade Tambascia:
Protection Aspects of Iconic Passwords on Mobile Devices. 21-32 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. 33-47 - Jemal H. Abawajy, Andrei V. Kelarev:
A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering. 48-56 - Yong Feng, Bo Wang, Fengling Han, Xinghuo Yu, Zahir Tari:
Chattering-Free Terminal Sliding-Mode Observer for Anomaly Detection. 57-65 - Paul A. Watters, Nigel Phair:
Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA). 66-76 - Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Improving Content Availability in the I2P Anonymous File-Sharing Environment. 77-92 - Mark Stegelmann, Dogan Kesdogan:
V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid. 93-107 - Daniel Angermeier, Konstantin Böttinger, Andreas Ibing, Dieter Schuster, Frederic Stumpf, Dirk Wacker:
A Secure Architecture for Smart Meter Systems. 108-122 - Geng Yang, Qiang Zhou, Xiaolong Xu, Jian Xu, Chunming Rong:
A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. 123-138 - Ferdous A. Barbhuiya, Tonmoy Saikia, Sukumar Nandi:
An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics. 139-152 - Avinash Srinivasan, Lashidhar Chennupati:
Robust Authentication of Public Access Points Using Digital Certificates - A Novel Approach. 153-164 - Fei Han, Jing Qin, Huawei Zhao, Jiankun Hu:
A General Transformation from KP-ABE to Searchable Encryption. 165-178 - Luca Ferretti, Michele Colajanni, Mirco Marchetti:
Supporting Security and Consistency for Cloud Database. 179-193 - Ronald Petrlic:
Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme. 194-211 - Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai:
Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic. 212-226 - Craig Valli:
SSH - Somewhat Secure Host. 227-235 - Nimalaprakasan Skandhakumar, Farzad Salim, Jason Reid, Ed Dawson:
Physical Access Control Administration Using Building Information Models. 236-250 - Yongming Yang, Zulong Zhang, Fengling Han, Kunming Lin:
Multiple Factors Based Evaluation of Fingerprint Images Quality. 251-264 - Yang Liu, Hongda Li, Qihua Niu:
A Leakage-Resilient Zero Knowledge Proof for Lattice Problem. 265-278 - Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
MDSE@R: Model-Driven Security Engineering at Runtime. 279-295 - Huawei Zhao, Jing Qin, Minglei Shu, Jiankun Hu:
A Hash Chains Based Key Management Scheme for Wireless Sensor Networks. 296-308 - Anderson Nunes Paiva Morais, Ana R. Cavalli:
An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks. 309-323 - Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
A State-Aware RFID Privacy Model with Reader Corruption. 324-338 - Leyi Shi, Xiaorui Wang, Wenjing Fu, Xin Liu, Zhen Qin:
An Improved Anti-collision Algorithm for ISO15693 RFID Systems. 339-351 - Xin-Wen Wu, Alan Wee-Chung Liew:
Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution. 352-361 - Jiguo Li, Yichen Zhang, Huiyun Teng:
A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. 362-376 - Jan Muhammad, Thomas Doherty, Sardar Hussain, Richard O. Sinnott:
Policy-Based Vulnerability Assessment for Virtual Organisations. 377-399 - Atsuko Miyaji, Phuong V. X. Tran:
Constant-Ciphertext-Size Dual Policy Attribute Based Encryption. 400-413 - Max-Emanuel Maurer, Lukas Höfer:
Sophisticated Phishers Make More Spelling Mistakes: Using URL Similarity against Phishing. 414-426 - Younchan Jung, Enrique Festijo:
Secure Mobility Management Based on Session Key Agreements. 427-440 - Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior:
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing. 441-458 - Alexandre Melo Braga, Erick N. Nascimento:
Portability Evaluation of Cryptographic Libraries on Android Smartphones. 459-469 - Eduardo B. Fernández, Anton V. Uzunov:
Secure Middleware Patterns. 470-482 - Yuxin Meng, Lam-for Kwok:
Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction. 483-497 - Michael N. Johnstone, Andrew Woodward:
Towards Effective Algorithms for Intelligent Defense Systems. 498-508
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.