default search action
13th NSS 2019: Sapporo, Japan
- Joseph K. Liu, Xinyi Huang:
Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11928, Springer 2019, ISBN 978-3-030-36937-8
Invited Papers
- Bagus Santoso, Yasutada Oohama, Chunhua Su:
Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks. 3-17 - Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. 18-36 - Qingqing Gan, Cong Zuo, Jianfeng Wang, Shifeng Sun, Xiaoming Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey. 37-52 - Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
A Graph Database-Based Approach to Analyze Network Log Files. 53-73
Full Papers
- Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci:
A Privacy-Enhancing Framework for Internet of Things Services. 77-97 - Matthew Dekker, Vimal Kumar:
Using Audio Characteristics for Mobile Device Authentication. 98-113 - Hanyi Sun, Na Ruan, Hanqing Liu:
Ethereum Analysis via Node Clustering. 114-129 - Tsz Hon Yuen, Siu-Ming Yiu:
Strong Known Related-Key Attacks and the Security of ECDSA. 130-145 - Manjunath Bilur, Anugrah Gari, R. K. Shyamasundar:
Threat Assessment of Enterprise Applications via Graphical Modelling. 146-166 - Yawei Wang, Chenxu Wang, Xiapu Luo, Kaixiang Zhang, Huizhong Li:
A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing. 167-184 - Deina Kellezi, Christian Boegelund, Weizhi Meng:
Towards Secure Open Banking Architecture: An Evaluation with OWASP. 185-198 - Luís Dias, Hélder Reia, Rui Neves, Miguel Correia:
OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms. 199-220 - Karin Sumongkayothin, Pakpoom Rachtrachoo, Arnuphap Yupuech, Kasidit Siriporn:
OVERSCAN: OAuth 2.0 Scanner for Missing Parameters. 221-233 - Peng Li, Junzuo Lai:
LaT-Voting: Traceable Anonymous E-Voting on Blockchain. 234-254 - Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu:
Distributed Secure Storage System Based on Blockchain and TPA. 255-271 - Zhentian Xiong, Zoe Lin Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang:
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique. 272-287 - Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu:
A Practical Dynamic Enhanced BFT Protocol. 288-304 - Juan Zhao, Tianrui Zong, Yong Xiang, Longxiang Gao, Gleb Beliakov:
Pre-adjustment Based Anti-collusion Mechanism for Audio Signals. 305-319 - Shou-Hsuan Stephen Huang, Zechun Cao, Calvin E. Raines, Mai N. Yang, Camille Simon:
Detecting Intruders by User File Access Patterns. 320-335 - Xinshu Ma, Chunpeng Ge, Zhe Liu:
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture. 336-351 - Wenyi Tang, Bo Qin, Suyun Zhao, Boning Zhao, Yunzhi Xue, Hong Chen:
Privacy Preserving Machine Learning with Limited Information Leakage. 352-370 - Gabriel Jerome Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks:
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT. 371-386 - Shingo Sato, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs with Detecting Functionality Revisited. 387-407 - Li Zhang, Zhuo Lv, Xuesong Zhang, Cen Chen, Nuannuan Li, Yidong Li, Wei Wang:
A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System. 408-417 - Huyen Tran, Dat Tran, Wanli Ma, Phuoc Nguyen:
EEG-Based Person Authentication with Variational Universal Background Model. 418-432 - Jingjing Song, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, Wei Wang:
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts. 433-442 - Yang Liu, Hanxiao Xue, Guocheng Wei, Lisu Wu, Yu Wang:
A Comparative Study on Network Traffic Clustering. 443-455 - Mohammad Saiful Islam Mamun, Rongxing Lu, Manon Gaudet:
Tell Them from Me: An Encrypted Application Profiler. 456-471 - Juan Luo, Lei Yang, Chun Wang, Huan Zhao:
Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP. 472-487 - Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu:
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies. 488-503 - Mitsuyoshi Imamura, Kazumasa Omote:
Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain. 504-519 - Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma:
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration. 520-535 - Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang:
Cryptanalysis of Raindrop and FBC. 536-551 - Hui Zheng, Jun Shao, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao:
Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption. 552-566 - Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou:
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost. 567-580 - Jinhui Liu, Yong Yu:
Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures. 581-595 - Huili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu:
Privacy-Preserving Sequential Data Publishing. 596-614 - Kang Li, Wang Fat Lau, Man Ho Au:
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter. 615-631 - Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache:
Keyed Non-parametric Hypothesis Tests. 632-645 - Sibghat Ullah Bazai, Julian Jang-Jaccard:
SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform. 646-662
Short Papers
- Ou Ruan, Yang Yang, Mingwu Zhang:
An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol. 665-674 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices. 675-684 - Othmane El Omri, Aymen Boudguiga, Malika Izabachène, Witold Klaudel:
Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition. 685-696 - Adam Bobowski, Miroslaw Kutylowski:
Derandomized PACE with Mutual Authentication. 697-705 - Wei Ou, Entao Luo, Zhiyuan Tan, Lihong Xiang, Qin Yi, Chen Tian:
A Multi-attributes-Based Trust Model of Internet of Vehicle. 706-713 - Mamoru Mimura:
Using Sparse Composite Document Vectors to Classify VBA Macros. 714-720 - Xu Wang, Ping Yu, Guangsheng Yu, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo:
A High-Performance Hybrid Blockchain System for Traceable IoT Applications. 721-728
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.