Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao |
GP-ORAM: A Generalized Partition ORAM. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Teng Wu, Guang Gong |
New Message Authentication Code Based on APN Functions and Stream Ciphers. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Anonymous Evaluation System. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani |
Android Botnets: What URLs are Telling Us. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni |
Indicators of Malicious SSL Connections. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Jain, Narendra S. Chaudhari |
Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chao Li 0023, Balaji Palanisamy |
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad |
Foundations of Optical Encryption: A Candidate Short-Key Scheme. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jinwei Xu, Jiankun Hu |
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christian Callegari, Stefano Giordano, Michele Pagano |
Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Michel Cioranesco, Craig Hampel, Guilherme Ozari de Almeida, Rodrigo Portella do Canto |
Cryptographically Secure On-Chip Firewalling. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Ríha, Vashek Matyas |
Service in Denial - Clouds Going with the Winds. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson |
Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | P. Krishnan, Navjot Singh 0001 |
VICI: Visual Caller Identification for Contact Center Applications. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Duane Wilson, Giuseppe Ateniese |
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen 0002, Nigel Edwards, Jing Jin |
Assessing Attack Surface with Component-Based Package Dependency. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang |
A Study of Network Domains Used in Android Applications. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Aldribi, Issa Traoré |
A Game Theoretic Framework for Cloud Security Transparency. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Javier Baliosian, Ana R. Cavalli |
An Abstraction for the Interoperability Analysis of Security Policies. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ross K. Gegan, Rennie Archibald, Matthew K. Farrens, Dipak Ghosal |
Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji, Shohei Nishida |
A Scalable Multiparty Private Set Intersection. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fuqun Wang, Kunpeng Wang, Bao Li 0001 |
An Efficient Leveled Identity-Based FHE. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hui Ma 0002, Rui Zhang 0002 |
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoshuang Ma, Kexin Qiao |
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani |
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhiguo Wan, Robert H. Deng, David Lee |
Electronic Contract Signing Without Using Trusted Third Party. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Weizhi Meng 0001 |
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang 0001 (eds.) |
Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford |
Detecting Malicious Activity on Smartphones Using Sensor Measurements. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Javid Habibi, Ajay Panicker, Aditi Gupta 0002, Elisa Bertino |
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao 0020 |
A New Statistical Approach for Integral Attack. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Navid Pustchi, Ravi S. Sandhu |
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub |
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Brian Ricks, Patrick Tague |
Isolation of Multiple Anonymous Attackers in Mobile Networks. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Li Xu 0002, Limei Lin, Sheng Wen |
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang 0084, Mikhail Istomin, Jeffrey Bickford |
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jongho Won, Elisa Bertino |
Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qingji Zheng, Xiangxue Li, Aytac Azgin |
CLKS: Certificateless Keyword Search on Encrypted Data. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi |
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhenhua Chen, Shundong Li, Yimin Guo 0001, Yilei Wang, Yunjie Chu |
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong |
Capturing Android Malware Behaviour Using System Flow Graph. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Li Yang 0005, Jianfeng Ma 0001, Wei Wang 0105, Chunjie Cao |
Multi-domain Direct Anonymous Attestation Scheme from Pairings. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Di Wu 0050, Xiao Chen 0002, Chao Chen 0015, Jun Zhang 0010, Yang Xiang 0001, Wanlei Zhou 0001 |
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan |
Tighter Security Bound of MIBS Block Cipher against Differential Attack. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuangyu He, Jianwei Liu 0001, Jian Mao, Jie Chen 0038 |
Hierarchical Solution for Access Control and Authentication in Software Defined Networks. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette |
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yi Tang, Piaoping Lin, Zhaokai Luo |
psOBJ: Defending against Traffic Analysis with pseudo-Objects. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tapas Pandit, Rana Barua, Somanath Tripathy |
eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim F. Elashry, Yi Mu 0001, Willy Susilo |
Jhanwar-Barua's Identity-Based Encryption Revisited. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiutao Feng, Fan Zhang |
Cryptanalysis on the Authenticated Cipher Sablier. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuquan Hou, Xinyi Huang 0001, Li Xu 0002 |
Identity-Based Transitive Signcryption. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bo Tang, Ravi S. Sandhu |
Extending OpenStack Access Control with Domain Trust. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weiwei Liu 0005, Yi Mu 0001, Guomin Yang |
Attribute-Based Signing Right Delegation. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khoa Nguyen 0004, Dat Tran 0001, Wanli Ma, Dharmendra Sharma 0001 |
A Proposed Approach to Compound File Fragment Identification. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia |
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yilei Wang, Zhe Liu 0001, Tao Li, Qiuliang Xu |
Rational Secure Two-party Computation in Social Cloud. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli |
How to Evaluate Trust Using MMT. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Miao Xie, Jiankun Hu, Xinghuo Yu 0001, Elizabeth Chang 0001 |
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hasini Gunasinghe, Elisa Bertino |
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao |
Identity Based Threshold Ring Signature from Lattices. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yong Li, Yuanyuan Zhang 0002, Juanru Li, Dawu Gu |
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wei Zhou, Jiankun Hu, Song Wang 0003, Ian R. Petersen, Mohammed Bennamoun |
Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yamin Wen, Zheng Gong |
A Dynamic Matching Secret Handshake Scheme without Random Oracles. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun |
A New Public Key Encryption with Equality Test. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jiguo Li 0001, Xuexia Zhao, Yichen Zhang 0003 |
Certificate-Based Conditional Proxy Re-Encryption. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vandana Guleria, Ratna Dutta |
Lightweight Universally Composable Adaptive Oblivious Transfer. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Barbara Carminati, C.-C. Jay Kuo (eds.) |
Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu |
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khoa Nguyen 0004, Dat Tran 0001, Wanli Ma, Dharmendra Sharma 0001 |
A New Approach to Executable File Fragment Detection in Network Forensics. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jingwan Zhang, Yiming Zhao |
A New Multivariate Based Threshold Ring Signature Scheme. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng |
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry |
Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yumei Li 0002, Holger Voos, Albert Rosich, Mohamed Darouach |
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mengmeng Ge, Kim-Kwang Raymond Choo |
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang 0002 |
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pratish Datta, Dibyendu Roy 0001, Sourav Mukhopadhyay |
A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jia Yan, Lingyun Ying, Yi Yang 0040, Purui Su, Qi Li 0002, Hui Kong, Dengguo Feng |
Revisiting Node Injection of P2P Botnet. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yonglin Hao, Dongxia Bai, Leibo Li |
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dang Nguyen 0001, Jaehong Park, Ravi S. Sandhu |
Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yong Yu 0002, Yi Mu 0001, Jianbing Ni, Jiang Deng, Ke Huang 0002 |
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Feng, Zheng Yuan |
A Secure Obfuscator for Encrypted Blind Signature Functionality. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su |
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mengting Li, Xinyi Huang 0001, Joseph K. Liu, Li Xu 0002 |
GO-ABE: Group-Oriented Attribute-Based Encryption. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chien-Ming Chen 0001, Tsu-Yang Wu, Raylin Tso, Mu-En Wu |
Security Analysis and Improvement of Femtocell Access Control. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | N. Rajamanickam, R. Nadarajan, Atilla Elçi |
Formal Verification of Finite State Transactional Security Policy. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi |
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Li Xi, Dengguo Feng |
Formal Analysis of DAA-Related APIs in TPM 2.0. |
NSS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao, Ratna Dutta |
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yao Lu 0002, Rui Zhang 0002, Dongdai Lin |
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto |
Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force Attacks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie |
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Midi, Ashish Kundu, Elisa Bertino |
Towards Authenticated Objects. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dheerendra Mishra, Vinod Kumar 0003, Sourav Mukhopadhyay |
A Pairing-Free Identity Based Authentication Framework for Cloud Computing. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Borja Sanz 0001, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo García Bringas |
MADS: Malicious Android Applications Detection through String Analysis. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhihui Han, Liang Cheng 0004, Yang Zhang 0021, Dengguo Feng |
Measuring and Comparing the Protection Quality in Different Operating Systems. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi |
Building Better Unsupervised Anomaly Detector with S-Transform. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fudong Li 0001, Nathan L. Clarke, Steven Furnell |
A Technology Independent Security Gateway for Real-Time Multimedia Communication. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wencheng Yang, Jiankun Hu, Song Wang 0003 |
A Finger-Vein Based Cancellable Bio-cryptosystem. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Tang 0001 |
Towards a Privacy-Preserving Solution for OSNs. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis |
Using the Smart Card Web Server in Secure Branchless Banking. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|