© 2019

Network and System Security

13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings

  • Joseph K. Liu
  • Xinyi Huang
Conference proceedings NSS 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11928)

Also part of the Security and Cryptology book sub series (LNSC, volume 11928)

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Invited Papers

    1. Front Matter
      Pages 1-1
    2. Liu Liu, Chao Chen, Jun Zhang, Olivier De Vel, Yang Xiang
      Pages 18-36
    3. Qingqing Gan, Cong Zuo, Jianfeng Wang, Shi-Feng Sun, Xiaoming Wang
      Pages 37-52
    4. Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac
      Pages 53-73
  3. Full Papers

    1. Front Matter
      Pages 75-75
    2. Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
      Pages 77-97
    3. Matthew Dekker, Vimal Kumar
      Pages 98-113
    4. Hanyi Sun, Na Ruan, Hanqing Liu
      Pages 114-129
    5. Tsz Hon Yuen, Siu-Ming Yiu
      Pages 130-145
    6. Manjunath Bilur, Anugrah Gari, R. K. Shyamasundar
      Pages 146-166
    7. Yawei Wang, Chenxu Wang, Xiapu Luo, Kaixiang Zhang, Huizhong Li
      Pages 167-184
    8. Deina Kellezi, Christian Boegelund, Weizhi Meng
      Pages 185-198
    9. Luís Dias, Hélder Reia, Rui Neves, Miguel Correia
      Pages 199-220
    10. Karin Sumongkayothin, Pakpoom Rachtrachoo, Arnuphap Yupuech, Kasidit Siriporn
      Pages 221-233
    11. Peng Li, Junzuo Lai
      Pages 234-254
    12. Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu
      Pages 255-271
    13. Zhentian Xiong, Zoe L. Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang
      Pages 272-287
    14. Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu et al.
      Pages 288-304

About these proceedings


This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019.

The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.


access control artificial intelligence authentication computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases distributed computer systems network protocols network security privacy signal processing telecommunication networks telecommunication systems telecommunication traffic

Editors and affiliations

  • Joseph K. Liu
    • 1
  • Xinyi Huang
    • 2
  1. 1.Monash UniversityClaytonAustralia
  2. 2.Fujian Normal UniversityFuzhouChina

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment