default search action
9th NSS 2015: New York, NY, USA
- Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang:
Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings. Lecture Notes in Computer Science 9408, Springer 2015, ISBN 978-3-319-25644-3
Wireless Security and Privacy
- Wei Wang, Mikhail Istomin, Jeffrey Bickford:
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks. 3-17 - Jongho Won, Elisa Bertino:
Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. 18-31 - Brian Ricks, Patrick Tague:
Isolation of Multiple Anonymous Attackers in Mobile Networks. 32-45 - Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. 46-59
Smartphone Security
- Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez:
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. 63-77 - Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani:
Android Botnets: What URLs are Telling Us. 78-91
Systems Security
- Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson:
Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs. 95-111 - Javid Habibi, Ajay Panicker, Aditi Gupta, Elisa Bertino:
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices. 112-129 - Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Ríha, Vashek Matyas:
Service in Denial - Clouds Going with the Winds. 130-143
Application Security
- Weizhi Meng:
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. 147-161 - Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni:
Indicators of Malicious SSL Connections. 162-175 - Jinwei Xu, Jiankun Hu:
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing. 176-187
Security Management
- Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi:
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection. 191-205 - Navid Pustchi, Ravi S. Sandhu:
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust. 206-220 - Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub:
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. 221-235
Applied Cryptography
- Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. 239-253 - Hui Ma, Rui Zhang:
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. 254-267 - Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
GP-ORAM: A Generalized Partition ORAM. 268-282 - Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Anonymous Evaluation System. 283-299
Cryptosystems
- Fuqun Wang, Kunpeng Wang, Bao Li:
An Efficient Leveled Identity-Based FHE. 303-315 - Ashish Jain, Narendra S. Chaudhari:
Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks. 316-330 - Xiaoshuang Ma, Kexin Qiao:
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. 331-344 - Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao:
A New Statistical Approach for Integral Attack. 345-356
Short Papers: Cryptographic Mechanisms
- Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad:
Foundations of Optical Encryption: A Candidate Short-Key Scheme. 359-367 - Duane Wilson, Giuseppe Ateniese:
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. 368-375 - Atsuko Miyaji, Shohei Nishida:
A Scalable Multiparty Private Set Intersection. 376-385 - Zhiguo Wan, Robert H. Deng, David Lee:
Electronic Contract Signing Without Using Trusted Third Party. 386-394 - Teng Wu, Guang Gong:
New Message Authentication Code Based on APN Functions and Stream Ciphers. 395-402
Short Papers: Security Mechanisms
- Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. 405-417 - Javier Baliosian, Ana R. Cavalli:
An Abstraction for the Interoperability Analysis of Security Policies. 418-427 - Jean-Michel Cioranesco, Craig Hampel, Guilherme Ozari de Almeida, Rodrigo Portella do Canto:
Cryptographically Secure On-Chip Firewalling. 428-438 - Christian Callegari, Stefano Giordano, Michele Pagano:
Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection. 439-446
Short Papers: Mobile and Cloud Security
- Chao Li, Balaji Palanisamy:
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. 449-458 - Li Xu, Limei Lin, Sheng Wen:
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks. 459-466 - Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang:
A Study of Network Domains Used in Android Applications. 467-474 - Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford:
Detecting Malicious Activity on Smartphones Using Sensor Measurements. 475-487 - Abdulaziz Aldribi, Issa Traoré:
A Game Theoretic Framework for Cloud Security Transparency. 488-500
Short Papers: Application and Network Security
- Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Let's Get Mobile: Secure FOTA for Automotive System. 503-510 - P. Krishnan, Navjot Singh:
VICI: Visual Caller Identification for Contact Center Applications. 511-518 - Ross K. Gegan, Rennie Archibald, Matthew K. Farrens, Dipak Ghosal:
Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System. 519-530 - Hang Cai, Krishna K. Venkatasubramanian:
Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks. 531-539
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.