Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | James Alderman, Jason Crampton |
On the Use of Key Assignment Schemes in Authentication Protocols. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiguo Li 0001, Yanqiong Li, Yichen Zhang 0003 |
Forward Secure Certificateless Proxy Signature Scheme. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yang Wang 0074, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo |
Threshold-Oriented Optimistic Fair Exchange. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Elisavet Konstantinou |
An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé |
The OffPAD: Requirements and Usage. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sashi Gurung, Dan Lin 0001, Anna Cinzia Squicciarini, Elisa Bertino |
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann |
Privacy Preserving Context Aware Publish Subscribe Systems. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shaohua Tang, Lingling Xu |
Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa |
Performance Prediction Model for Block Ciphers on GPU Architectures. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel |
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zheli Liu, Haoyu Ma, Jin Li 0002, Chunfu Jia, Jingwei Li 0001, Ke Yuan |
Secure Storage and Fuzzy Query over Encrypted Databases. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig |
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fan Zhang, Hua Guo, Zhoujun Li |
Ancestor Excludable Hierarchical ID-Based Encryption Revisited. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Meng 0001, Wenjuan Li 0001, Lam-for Kwok |
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale |
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jorge de-la-Peña-Sordo, Igor Santos, Iker Pastor-López, Pablo García Bringas |
Filtering Trolling Comments through Collective Classification. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gabriel Cartier, Jean-François Cartier, José M. Fernandez 0001 |
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis |
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Alomari |
Security Authentication of AODV Protocols in MANETs. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yan Li 0075, Yingjiu Li, Qiang Yan 0001, Robert H. Deng |
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason Cohen, Subatra Acharya |
Towards a More Secure Apache Hadoop HDFS Infrastructure - Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kannan Karthik |
Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias |
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi |
Model the Influence of Sybil Nodes in P2P Botnets. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James |
Tracing Sources of Anonymous Slow Suspicious Activities. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Bertholon, Sébastien Varrette, Pascal Bouvry |
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Weijia Wang, Lei Hu, Yong Li 0002 |
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto |
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert 0001 |
X-TIER: Kernel Module Injection. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro |
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mahdi Aiash |
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Javier López 0001, Xinyi Huang, Ravi S. Sandhu (eds.) |
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jianwei Liu 0001, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu |
Light Weight Network Coding Based Key Distribution Scheme for MANETs. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | James Kirrage, Asiri Rathnayake, Hayo Thielecke |
Static Analysis for Regular Expression Denial-of-Service Attacks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis |
Insiders Trapped in the Mirror Reveal Themselves in Social Media. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hongda Li 0001, Qihua Niu, Bei Liang |
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jia Hu 0001, Hui Lin 0007, Li Xu 0002 |
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aditi Gupta 0002, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino |
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen |
Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jörg Daubert, Mathias Fischer 0001, Stefan Schiffner, Max Mühlhäuser |
Distributed and Anonymous Publish-Subscribe. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sheng Wen, Yang Xiang 0001, Wanlei Zhou 0001 |
Modeling and Analysis for Thwarting Worm Propagation in Email Networks. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sana Ullah, Waleed Alsalih |
On Secure and Power-Efficient RFID-Based Wireless Body Area Network. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang |
On the Security of an Efficient Attribute-Based Signature. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Jim Burns, Brian A. Coan, John L. Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright |
Efficient and Private Three-Party Publish/Subscribe. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang |
A New Unpredictability-Based RFID Privacy Model. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chao Wang, Kefei Mao, Jianwei Liu 0001, Jianhua Liu |
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Hervé Chabanne, Alain Patey |
Collusion-Resistant Domain-Specific Pseudonymous Signatures. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Zhou, Jiankun Hu, Ian R. Petersen, Mohammed Bennamoun |
Partial Fingerprint Reconstruction with Improved Smooth Extension. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Roberto Carbone, Luca Zanetti |
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Spreitzer, Thomas Plos |
On the Applicability of Time-Driven Cache Attacks on Mobile Devices. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador |
On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Krauß, Volker Fusenig |
Using Trusted Platform Modules for Location Assurance in Cloud Networking. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jing Chen 0003, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang 0001 |
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Suaad S. Alarifi, Stephen D. Wolthusen |
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xu Huang 0001, Salahiddin Altahat, Dat Tran 0001, Shutao Li |
Human Identification with Electroencephalogram (EEG) for the Future Network Security. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang |
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mahdi Aiash |
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino |
A Comprehensive Access Control System for Scientific Applications. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Pfoh, Christian A. Schneider, Claudia Eckert 0001 |
Leveraging String Kernels for Malware Detection. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shengli Liu 0001, Fangguo Zhang, Kefei Chen |
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jingwei Li 0001, Jin Li 0002, Xiaofeng Chen 0001, Chunfu Jia, Zheli Liu |
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jing Guo, Zhuxiao Wang |
Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xilin Zhang, Yingjie Wu, Xiaodong Wang 0003 |
Differential Privacy Data Release through Adding Noise on Average Value. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu |
Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Alcaraz, Javier López 0001 |
Addressing Situational Awareness in Critical Domains of a Smart Grid. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding |
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yue Yu, Michael Fry 0001, Bernhard Plattner, Paul Smith 0001, Alberto E. Schaeffer Filho |
Resilience Strategies for Networked Malware Detection and Remediation. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman |
A Secure and Private RFID Authentication Protocol under SLPN Problem. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Yang, Futai Zhang, Limin Shen |
Practical Certificateless Public Key Encryption in the Standard Model. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Meng 0001, Lam-for Kwok |
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani |
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eitan Menahem, Rami Puzis, Yuval Elovici |
Detecting Spammers via Aggregated Historical Data Set. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amani S. Ibrahim, John Grundy 0001, James H. Hamlyn-Harris, Mohamed Almorsy |
Operating System Kernel Data Disambiguation to Support Security Analysis. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo |
(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin 0001 |
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Roman Schlegel, Duncan S. Wong |
Private Friends on a Social Networking Site Operated by an Overly Curious SNP. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ding Wang 0002, Chunguang Ma, De-li Gu, Zhen-shan Cui |
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuechuan Wei, Xiaoyuan Yang 0002, Chao Li, Weidong Du |
Impossible Differential Cryptanalysis on Tweaked E2. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fei Tang, Changlu Lin, Pinhui Ke |
Universal Designated Verifier Signcryption. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lukasz Krzywiecki, Miroslaw Kutylowski |
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Ranise, Alessandro Armando |
On the Automated Analysis of Safety in Usage Control: A New Decidability Result. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Qi Han, Yinghui Zhang 0002, Xiaofeng Chen 0001, Hui Li 0006, Jiaxiang Quan |
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan |
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tae-Gyu Lee, Gi-Soo Chung |
A Scalable Link Model for Local Optical Wireless Networks. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yang Yang 0026 |
A Communication Efficient Group Key Distribution Scheme for MANETs. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor |
A Bird's Eye View on the I2P Anonymous File-Sharing Environment. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Huimin Shuai, Wen Tao Zhu |
Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou |
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Wagner, Sascha Wessel, Frederic Stumpf |
Attestation of Mobile Baseband Stacks. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mu-En Wu, Raylin Tso, Hung-Min Sun |
Cryptanalysis of Exhaustive Search on Attacking RSA. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Li Xu 0002, Elisa Bertino, Yi Mu 0001 (eds.) |
Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaiqi Xiong |
The Performance of Public Key-Based Authentication Protocols. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy 0001, Mohamed Almorsy |
Identifying OS Kernel Objects for Run-Time Security Analysis. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tae-Gyu Lee, Gi-Soo Chung |
Background Transfer Method for Ubiquitous Computing. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Beilke, Volker Roth 0002 |
FlexCOS: An Open Smartcard Platform for Research and Education. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mu-En Wu, Raylin Tso, Hung-Min Sun |
On the Improvement of Fermat Factorization. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Leyou Zhang, Qing Wu 0005, Yupu Hu |
Direct CCA Secure Identity-Based Broadcast Encryption. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nima Mousavi, Mahesh V. Tripunitara |
Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC). |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shaohua Tang, Lingling Xu |
Proxy Signature Scheme Based on Isomorphisms of Polynomials. |
NSS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kui Xu 0002, Danfeng Yao, Qiang Ma 0006, Alexander Crowell |
Detecting infection onset with behavior-based policies. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|