Muutke küpsiste eelistusi

Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings [Pehme köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 480 pages, kõrgus x laius: 235x155 mm, kaal: 7606 g, 149 Illustrations, black and white; XXVI, 480 p. 149 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 8300
  • Ilmumisaeg: 08-Nov-2013
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319035835
  • ISBN-13: 9783319035833
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 480 pages, kõrgus x laius: 235x155 mm, kaal: 7606 g, 149 Illustrations, black and white; XXVI, 480 p. 149 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 8300
  • Ilmumisaeg: 08-Nov-2013
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319035835
  • ISBN-13: 9783319035833
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.

A Crawler Guard for Quickly Blocking Unauthorized Web Robot.- Privacy Preserving for Location-Based Services Using Location Transformation.- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.- Multiple-Bank E-Cash without Random Oracles.- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy.- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures.- Towards a Security-Enhanced Firewall Application for OpenFlow Networks.- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows.- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks.- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6.- Fast Scalar Multiplication on Elliptic Curve Cryptography in

Selected Intervals Suitable for Wireless Sensor Networks.- Alert Correlation Algorithms: A Survey and Taxonomy.- Construction and Verification of Mobile Ad Hoc Network Protocols.- Zero-Day Traffic Identification.- Design and Implementation of a Testbed for the Security Assessment of MANETs.- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.- Anonymous Identity-Based Broadcast Encryption with Adaptive Security.- Hierarchical Identity-Based Signature with Short Public Keys.- PeerViewer: Behavioral Tracking and Classification of P2P Malware.- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification.- Detecting Stepping Stones by Abnormal Causality Probability.- Algebra-Based Behavior Identification of Trojan Horse.- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.- The Hot-Spots Problem in Windows 8 Graphical Password Scheme.- Static

Detection of Dangerous Behaviors in Android Apps.- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function.- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.- NetSecRadar: A Visualization System for Network Security Situational Awareness.- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System.- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space.- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux.- Towards an Open Framework Leveraging a Trusted Execution Environment.- Secure Re-publication of Dynamic Big Data.
CSS 2013 Regular Papers
Data and Applications Security
A Crawler Guard for Quickly Blocking Unauthorized Web Robot
1(13)
Jan-Min Chen
Privacy Preserving for Location-Based Services Using Location Transformation
14(15)
Tao Peng
Qin Liu
Guojun Wang
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux
29(11)
Ang Mi
Weiping Wang
Shigeng Zhang
Hong Song
Multiple-Bank E-Cash without Random Oracles
40(12)
Jiangxiao Zhang
Zhoujun Li
Hua Guo
A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy
52(15)
Chong Fu
Tao Wang
Zhao-Yu Meng
Jun-Xin Chen
Hong-Feng Ma
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics
67(14)
Baosheng Ge
Wen-Tao Zhu
Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures
81(11)
Wencheng Yang
Jiankun Hu
Song Wang
Jucheng Yang
Towards a Security-Enhanced Firewall Application for OpenFlow Networks
92(12)
Juan Wang
Yong Wang
Hongxin Hu
Qingxin Sun
He Shi
Longjie Zeng
Network and Communications Security
Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method
104(13)
Lin-Bo Qiao
Bo-Feng Zhang
Rui-Yuan Zhao
Jin-Shu Su
Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows
117(15)
Pieter Burghouwt
Marcel Spruit
Henk Sips
Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks
132(19)
Layal Samarji
Frederic Cuppens
Nora Cuppens-Boulahia
Wael Kanoun
Samuel Dubus
Geolocation and Verification of IP-Addresses with Specific Focus on IPv6
151(20)
Robert Koch
Mario Golling
Gabi Dreo Rodosek
Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks
171(12)
Youssou Faye
Herve Guyennet
Ibrahima Niang
Yanbo Shou
Alert Correlation Algorithms: A Survey and Taxonomy
183(15)
Seyed Ali Mirheidari
Sajjad Arshad
Rasool Jalili
Construction and Verification of Mobile Ad Hoc Network Protocols
198(15)
Natsuki Kimura
Noriaki Yoshiura
Zero-Day Traffic Identification
213(15)
Jun Zhang
Xiao Chen
Yang Xiang
Wanlei Zhou
Design and Implementation of a Testbed for the Security Assessment of MANETs
228(15)
Christian Callegari
Stefano Giordano
Susanna Mannella
Michele Pagano
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology
243(15)
Qiang Liu
Jianping Yin
Shui Yu
Anonymous Identity-Based Broadcast Encryption with Adaptive Security
258(14)
Leyou Zhang
Qing Wu
Yi Mu
Hierarchical Identity-Based Signature with Short Public Keys
272(10)
Qing Wu
Leyou Zhang
Peer Viewer: Behavioral Tracking and Classification of P2P Malware
282(17)
Nizar Kheir
Xiao Han
Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification
299(9)
Jingping Song
Zhiliang Zhu
Peter Scully
Chris Price
Detecting Stepping Stones by Abnormal Causality Probability
308(15)
Sheng Wen
Ping Li
Di Wu
Yang Xiang
Wanlei Zhou
Algebra-Based Behavior Identification of Trojan Horse
323(15)
Aihua Peng
Lansheng Han
Yanan Yu
Nan Du
Mingquan Li
Software and Systems Security
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards
338(11)
Cheng-Chi Lee
Chun-Ta Li
Chi-Yao Weng
Jian-Jhong Jheng
Xiao-Qian Zhang
Yi-Rui Zhu
The Hot-Spots Problem in Windows 8 Graphical Password Scheme
349(14)
Haichang Gao
Wei Jia
Ning Liu
Kaisheng Li
Static Detection of Dangerous Behaviors in Android Apps
363(14)
Shaoyin Cheng
Shengmei Luo
Zifeng Li
Wei Wang
Yan Wu
Fan Jiang
Cloud Security and Cyberspace Safety
A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting keyword Search Function
377(10)
Changji Wang
Wentao Li
Yuan Li
Xilei Xu
A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing
387(16)
Shuhong Chen
Guojun Wang
Weijia Jia
NetSecRadar: A Visualization System for Network Security Situational Awareness
403(14)
Fangfang Zhou
Ronghua Shi
Ying Zhao
Yezi Huang
Xing Liang
Workshop Papers
Security and Quantum Communications
Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System
417(12)
Ronghua Shi
Ye Kang
Zhaoyuan Zhang
Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN
429(12)
Cai Fu
Deliang Xu
Lansheng Han
Jingfang Xu
Zhicun Fang
Security and Reliability in Transparent Computing
An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space
441(9)
Zemin Cai
Yi Wang
Renfa Li
An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux
450(8)
Zhenyu Wang
Yanqiu Ye
Ruimin Wang
Trust, Security and Privacy for Big Data
Towards an Open Framework Leveraging a Trusted Execution Environment
458(10)
Javier Gonzalez
Philippe Bonnet
Secure Re-publication of Dynamic Big Data
468(11)
Kok-Seng Wong
Myung Ho Kim
Author Index 479