default search action
12th NSS 2018: Hong Kong, China
- Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 - Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding:
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain. 1-15 - Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu:
Analysis on the Block Reward of Fork After Withholding (FAW). 16-31 - Peter Ince, Joseph K. Liu, Peng Zhang:
Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs. 32-45 - Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Burn After Reading: Expunging Execution Footprints of Android Apps. 46-63 - Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo:
A Comprehensive Study of Permission Usage on Android. 64-79 - Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam:
Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices. 80-94 - Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai:
Anonymous Attribute-Based Conditional Proxy Re-encryption. 95-110 - Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo:
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. 111-124 - Qiao Wang, Yu Guo, Hejiao Huang, Xiaohua Jia:
Multi-user Forward Secure Dynamic Searchable Symmetric Encryption. 125-140 - Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang:
Towards Security Authentication for IoT Devices with Lattice-Based ZK. 141-150 - Lili Xia, Zhangjie Fu:
Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud. 151-159 - Paola Barra, Carmen Bisogni, Michele Nappi, Stefano Ricciardi:
Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics. 160-173 - Aniello Castiglione, Kim-Kwang Raymond Choo, Maria De Marsico, Alessio Mecca:
Walking on the Cloud: Gait Recognition, a Wearable Solution. 174-186 - Nesrine Kaaniche, Sana Belguith, Giovanni Russello:
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. 187-201 - Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori:
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. 202-211 - Silvio Barra, Mirko Marras, Gianni Fenu:
Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke. 212-220 - Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma:
Real-Time IoT Device Activity Detection in Edge Networks. 221-236 - Yunfang Chen, Yihong Zhu, Hao Zhou, Wei Chen, Wei Zhang:
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi. 237-250 - Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian Damsgaard Jensen:
Analyzing the Communication Security Between Smartphones and IoT Based on CORAS. 251-265 - Yu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang, Rui Dai:
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture. 266-276 - Wensheng Zhang, Chuang Wang:
LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices. 277-287 - Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang:
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs. 288-303 - Francisco-Javier Rodrigo-Ginés, Javier Parra-Arnau, Weizhi Meng, Yu Wang:
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search. 304-318 - Yankang Zhao, Xiaobo Ma, Jianfeng Li, Shui Yu, Wei Li:
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. 319-336 - Amber Umair, Priyadarsi Nanda, Xiangjian He, Kim-Kwang Raymond Choo:
User Relationship Classification of Facebook Messenger Mobile Data using WEKA. 337-348 - Umberto Ferraro Petrillo:
Using Software Visualization for Supporting the Teaching of MapReduce. 349-360 - Ting Chen, Youzheng Feng, Xingwei Lin, Zihao Li, Xiaosong Zhang:
DBAF: Dynamic Binary Analysis Framework and Its Applications. 361-375 - Manuel Rigger, Daniel Pekarek, Hanspeter Mössenböck:
Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows. 376-390 - Animesh Basak Chowdhury, Ansuman Banerjee, Bhargab B. Bhattacharya:
ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical Systems. 391-410 - Zhi Xiong, Ting Guo, Qinkun Zhang, Yu Cheng, Kai Xu:
Android Malware Detection Methods Based on the Combination of Clustering and Classification. 411-422 - Danni Ren, Wenti Jiang, Huakang Li, Guozi Sun:
An OpenvSwitch Extension for SDN Traceback. 423-435 - Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu:
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks. 436-451 - Dragos-George Ionica, Florin Pop, Aniello Castiglione:
Creating and Managing Realism in the Next-Generation Cyber Range. 452-462 - Tony Miu Tung, Chenxu Wang, Jinhe Wang:
Understanding the Behaviors of BGP-based DDoS Protection Services. 463-473 - Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow:
Position Paper on Blockchain Technology: Smart Contract and Applications. 474-483 - Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang:
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. 484-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.