↓ Skip to main content

International Conference on Security and Privacy in Communication Networks

Overview of attention for book
Cover of 'International Conference on Security and Privacy in Communication Networks'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks
  3. Altmetric Badge
    Chapter 2 A Secure Architecture for Inter-cloud Virtual Machine Migration
  4. Altmetric Badge
    Chapter 3 STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds
  5. Altmetric Badge
    Chapter 4 An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability
  6. Altmetric Badge
    Chapter 5 Policy Driven Node Selection in MapReduce
  7. Altmetric Badge
    Chapter 6 GridMap: Enhanced Security in Cued-Recall Graphical Passwords
  8. Altmetric Badge
    Chapter 7 UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts
  9. Altmetric Badge
    Chapter 8 TPM-Based Authentication Mechanism for Apache Hadoop
  10. Altmetric Badge
    Chapter 9 An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
  11. Altmetric Badge
    Chapter 10 Social Authentication Identity: An Alternate to Internet Real Name System
  12. Altmetric Badge
    Chapter 11 On the Usability of Two-Factor Authentication
  13. Altmetric Badge
    Chapter 12 Securing Resource Discovery in Content Hosting Networks
  14. Altmetric Badge
    Chapter 13 Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations
  15. Altmetric Badge
    Chapter 14 Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems
  16. Altmetric Badge
    Chapter 15 Anonymous Publish-Subscribe Systems
  17. Altmetric Badge
    Chapter 16 Friendly Jamming for Secure Localization in Vehicular Transportation
  18. Altmetric Badge
    Chapter 17 Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks
  19. Altmetric Badge
    Chapter 18 Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication
  20. Altmetric Badge
    Chapter 19 A Simple and Novel Technique for Counteracting Exploit Kits
  21. Altmetric Badge
    Chapter 20 Policy Enforcement Point Model
  22. Altmetric Badge
    Chapter 21 Control Flow Obfuscation Using Neural Network to Fight Concolic Testing
  23. Altmetric Badge
    Chapter 22 EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients
  24. Altmetric Badge
    Chapter 23 SCADS
  25. Altmetric Badge
    Chapter 24 Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware
  26. Altmetric Badge
    Chapter 25 TST: A New Randomness Test Method Based on Coupon Collector’s Problem
  27. Altmetric Badge
    Chapter 26 Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy
  28. Altmetric Badge
    Chapter 27 Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos
  29. Altmetric Badge
    Chapter 28 An Information-Theoretic Approach for Secure Protocol Composition
  30. Altmetric Badge
    Chapter 29 Towards a Systematic Study of the Covert Channel Attacks in Smartphones
  31. Altmetric Badge
    Chapter 30 DroidKin: Lightweight Detection of Android Apps Similarity
  32. Altmetric Badge
    Chapter 31 Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme
  33. Altmetric Badge
    Chapter 32 Defending Blind DDoS Attack on SDN Based on Moving Target Defense
  34. Altmetric Badge
    Chapter 33 Function Escalation Attack
  35. Altmetric Badge
    Chapter 34 RAMSES: Revealing Android Malware Through String Extraction and Selection
  36. Altmetric Badge
    Chapter 35 Detecting Mobile Malware with TMSVM
  37. Altmetric Badge
    Chapter 36 Research on Credible Regulation Mechanism for the Trading of Digital Works
  38. Altmetric Badge
    Chapter 37 Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks
  39. Altmetric Badge
    Chapter 38 Domain Algorithmically Generated Botnet Detection and Analysis
  40. Altmetric Badge
    Chapter 39 Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy
  41. Altmetric Badge
    Chapter 40 Hybrid Detection Using Permission Analysis for Android Malware
  42. Altmetric Badge
    Chapter 41 Content Security Scheme for Content Centric Networks
  43. Altmetric Badge
    Chapter 42 Detection of Food Safety Topics Based on SPLDAs
  44. Altmetric Badge
    Chapter 43 Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps
  45. Altmetric Badge
    Chapter 44 JumpBox – A Seamless Browser Proxy for Tor Pluggable Transports
  46. Altmetric Badge
    Chapter 45 Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks
  47. Altmetric Badge
    Chapter 46 Characterizing Google Hacking: A First Large-Scale Quantitative Study
  48. Altmetric Badge
    Chapter 47 Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models
Attention for Chapter 25: TST: A New Randomness Test Method Based on Coupon Collector’s Problem
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
TST: A New Randomness Test Method Based on Coupon Collector’s Problem
Chapter number 25
Book title
International Conference on Security and Privacy in Communication Networks
Published by
Springer, Cham, September 2014
DOI 10.1007/978-3-319-23829-6_25
Book ISBNs
978-3-31-923828-9, 978-3-31-923829-6
Authors

Qinglong Zhang, Zongbin Liu, Quanwei Cai, Ji Xiang, Zhang, Qinglong, Liu, Zongbin, Cai, Quanwei, Xiang, Ji

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 50%
Other 1 50%
Readers by discipline Count As %
Computer Science 2 100%