|
|
|
Data and Applications Security |
|
|
|
A Crawler Guard for Quickly Blocking Unauthorized Web Robot |
|
|
1 | (13) |
|
|
Privacy Preserving for Location-Based Services Using Location Transformation |
|
|
14 | (15) |
|
|
|
|
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux |
|
|
29 | (11) |
|
|
|
|
|
Multiple-Bank E-Cash without Random Oracles |
|
|
40 | (12) |
|
|
|
|
A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy |
|
|
52 | (15) |
|
|
|
|
|
|
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics |
|
|
67 | (14) |
|
|
|
Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures |
|
|
81 | (11) |
|
|
|
|
|
Towards a Security-Enhanced Firewall Application for OpenFlow Networks |
|
|
92 | (12) |
|
|
|
|
|
|
|
Network and Communications Security |
|
|
|
Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method |
|
|
104 | (13) |
|
|
|
|
|
Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows |
|
|
117 | (15) |
|
|
|
|
Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks |
|
|
132 | (19) |
|
|
|
|
|
|
Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 |
|
|
151 | (20) |
|
|
|
|
Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks |
|
|
171 | (12) |
|
|
|
|
|
Alert Correlation Algorithms: A Survey and Taxonomy |
|
|
183 | (15) |
|
|
|
|
Construction and Verification of Mobile Ad Hoc Network Protocols |
|
|
198 | (15) |
|
|
|
Zero-Day Traffic Identification |
|
|
213 | (15) |
|
|
|
|
|
Design and Implementation of a Testbed for the Security Assessment of MANETs |
|
|
228 | (15) |
|
|
|
|
|
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology |
|
|
243 | (15) |
|
|
|
|
Anonymous Identity-Based Broadcast Encryption with Adaptive Security |
|
|
258 | (14) |
|
|
|
|
Hierarchical Identity-Based Signature with Short Public Keys |
|
|
272 | (10) |
|
|
|
Peer Viewer: Behavioral Tracking and Classification of P2P Malware |
|
|
282 | (17) |
|
|
|
Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification |
|
|
299 | (9) |
|
|
|
|
|
Detecting Stepping Stones by Abnormal Causality Probability |
|
|
308 | (15) |
|
|
|
|
|
|
Algebra-Based Behavior Identification of Trojan Horse |
|
|
323 | (15) |
|
|
|
|
|
|
Software and Systems Security |
|
|
|
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards |
|
|
338 | (11) |
|
|
|
|
|
|
|
The Hot-Spots Problem in Windows 8 Graphical Password Scheme |
|
|
349 | (14) |
|
|
|
|
|
Static Detection of Dangerous Behaviors in Android Apps |
|
|
363 | (14) |
|
|
|
|
|
|
|
Cloud Security and Cyberspace Safety |
|
|
|
A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting keyword Search Function |
|
|
377 | (10) |
|
|
|
|
|
A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing |
|
|
387 | (16) |
|
|
|
|
NetSecRadar: A Visualization System for Network Security Situational Awareness |
|
|
403 | (14) |
|
|
|
|
|
|
|
|
Security and Quantum Communications |
|
|
|
Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System |
|
|
417 | (12) |
|
|
|
|
Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN |
|
|
429 | (12) |
|
|
|
|
|
|
Security and Reliability in Transparent Computing |
|
|
|
An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space |
|
|
441 | (9) |
|
|
|
|
An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux |
|
|
450 | (8) |
|
|
|
|
Trust, Security and Privacy for Big Data |
|
|
|
Towards an Open Framework Leveraging a Trusted Execution Environment |
|
|
458 | (10) |
|
|
|
Secure Re-publication of Dynamic Big Data |
|
|
468 | (11) |
|
|
Author Index |
|
479 | |