7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings
De som köpt den här boken har ofta också köpt The Trading Game av Gary Stevenson (häftad).
Köp båda 2 för 696 krStochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.- A Technology Independent Security Gateway for Real-Time Multimedia Communication.- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.- Model the Influence of Sybil Nodes in P2P Botnets.- Network Security: Security Protocols and Practice A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.- The OffPAD: Requirements and Usage.- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.- Using Trusted Platform Modules for Location Assurance in Cloud Networking.- Network Security: Network Attacks and Defense Tracing Sources of Anonymous Slow Suspicious Activities.- Static Analysis for Regular Expression Denial-of-Service Attacks.- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.- System Security: Malware and Intrusions MADS: Malicious Android Applications Detection through String Analysis.- X-TIER: Kernel Module Injection.- Leveraging String Kernels for Malware Detection.- Insiders Trapped in the Mirror Reveal Themselves in Social Media.- System Security: Applications Security On Business Logic Vulnerabilities Hunting: The APP LogGIC Framework.- Using the Smart Card Web Server in Secure Branchless Banking.- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.- Efficient and Private Three-Party Publish/Subscribe.- System Security: Security Algorithms and Systems Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms.- Forward Secure Certificateless Proxy Signature Scheme.- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.- On the Security of an Efficient Attribute-Based Signature.- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.- Performance Prediction Model for Block Ciphers on GPU Architectures.- Threshold-Oriented Optimistic Fair Exchange.- Secure Storage and Fuzzy Query over Encrypted Databases.- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.- Privacy Preserving Context Aware Publish Subscribe Systems.- A New Unpredictability-Based RFID Privacy Model.- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.- Key Agreement and Distribution Light Weight Network Coding Based Key Distribution Scheme for MANETs.- Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.- Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks.- Human Identification with Electroencephalogram (EEG) for the Future Network Security.- Building Better Unsupervised Anomaly Detector with S-Transform.- Fault-Tolerant Topology Control Based on Artificial Immune in WMNs.- Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens.- On the Use of Key Assignment Schemes in Authentication Protocols.- On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems.- Security Authentication of AODV Protocols in MANETs.- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.- Towards a Privacy-Preserving Solution for OSNs.- Measuring and Comparing the Protection Quality in Different Operating Systems.- Collusion-Resistant Domain-Specific Pseudonymous Signatures.- On the Applicability of Time-Driven Cache Att