↓ Skip to main content

Network and System Security : 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings

Overview of attention for book
Cover of 'Network and System Security : 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures
  3. Altmetric Badge
    Chapter 2 Adopting Provenance-Based Access Control in OpenStack Cloud IaaS
  4. Altmetric Badge
    Chapter 3 Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage
  5. Altmetric Badge
    Chapter 4 A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service
  6. Altmetric Badge
    Chapter 5 Extending OpenStack Access Control with Domain Trust
  7. Altmetric Badge
    Chapter 6 Hierarchical Solution for Access Control and Authentication in Software Defined Networks
  8. Altmetric Badge
    Chapter 7 A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing
  9. Altmetric Badge
    Chapter 8 psOBJ: Defending against Traffic Analysis with pseudo-Objects
  10. Altmetric Badge
    Chapter 9 Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS
  11. Altmetric Badge
    Chapter 10 Revisiting Node Injection of P2P Botnet
  12. Altmetric Badge
    Chapter 11 On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification
  13. Altmetric Badge
    Chapter 12 Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack
  14. Altmetric Badge
    Chapter 13 A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
  15. Altmetric Badge
    Chapter 14 Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock
  16. Altmetric Badge
    Chapter 15 Cryptanalysis on the Authenticated Cipher Sablier
  17. Altmetric Badge
    Chapter 16 A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique
  18. Altmetric Badge
    Chapter 17 Security Analysis and Improvement of Femtocell Access Control
  19. Altmetric Badge
    Chapter 18 Identity Based Threshold Ring Signature from Lattices
  20. Altmetric Badge
    Chapter 19 Identity-Based Transitive Signcryption
  21. Altmetric Badge
    Chapter 20 GO-ABE: Group-Oriented Attribute-Based Encryption
  22. Altmetric Badge
    Chapter 21 Jhanwar-Barua’s Identity-Based Encryption Revisited
  23. Altmetric Badge
    Chapter 22 Lightweight Universally Composable Adaptive Oblivious Transfer
  24. Altmetric Badge
    Chapter 23 Certificate-Based Conditional Proxy Re-Encryption
  25. Altmetric Badge
    Chapter 24 A Secure Obfuscator for Encrypted Blind Signature Functionality
  26. Altmetric Badge
    Chapter 25 Attribute-Based Signing Right Delegation
  27. Altmetric Badge
    Chapter 26 Network and System Security
  28. Altmetric Badge
    Chapter 27 iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications
  29. Altmetric Badge
    Chapter 28 Formal Verification of Finite State Transactional Security Policy
  30. Altmetric Badge
    Chapter 29 Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features
  31. Altmetric Badge
    Chapter 30 Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
  32. Altmetric Badge
    Chapter 31 A Dynamic Matching Secret Handshake Scheme without Random Oracles
  33. Altmetric Badge
    Chapter 32 Formal Analysis of DAA-Related APIs in TPM 2.0
  34. Altmetric Badge
    Chapter 33 eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy
  35. Altmetric Badge
    Chapter 34 Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks
  36. Altmetric Badge
    Chapter 35 Network and System Security
  37. Altmetric Badge
    Chapter 36 Rational Secure Two-party Computation in Social Cloud
  38. Altmetric Badge
    Chapter 37 How to Evaluate Trust Using MMT
  39. Altmetric Badge
    Chapter 38 A Proposed Approach to Compound File Fragment Identification
  40. Altmetric Badge
    Chapter 39 Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework
  41. Altmetric Badge
    Chapter 40 A New Approach to Executable File Fragment Detection in Network Forensics
  42. Altmetric Badge
    Chapter 41 Tighter Security Bound of MIBS Block Cipher against Differential Attack
  43. Altmetric Badge
    Chapter 42 A New Multivariate Based Threshold Ring Signature Scheme
  44. Altmetric Badge
    Chapter 43 Capturing Android Malware Behaviour Using System Flow Graph
  45. Altmetric Badge
    Chapter 44 Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD
  46. Altmetric Badge
    Chapter 45 A New Public Key Encryption with Equality Test
  47. Altmetric Badge
    Chapter 46 A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers
  48. Altmetric Badge
    Chapter 47 Multi-domain Direct Anonymous Attestation Scheme from Pairings
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
5 X users

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Network and System Security : 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings
Published by
Springer International Publishing, October 2014
DOI 10.1007/978-3-319-11698-3
ISBNs
978-3-31-911697-6, 978-3-31-911698-3
Editors

Au, Man Ho, Kuo, C.-C. Jay, Carminati, Barbara

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 11 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 2 18%
Student > Master 2 18%
Student > Ph. D. Student 2 18%
Lecturer 1 9%
Other 1 9%
Other 0 0%
Unknown 3 27%
Readers by discipline Count As %
Computer Science 7 64%
Engineering 1 9%
Unknown 3 27%