Advertisement

Network and System Security

8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings

  • Man Ho Au
  • Barbara Carminati
  • C.-C. Jay Kuo

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8792)

Table of contents

  1. Front Matter
  2. Cloud Computing

    1. Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette
      Pages 1-14
    2. Dang Nguyen, Jaehong Park, Ravi Sandhu
      Pages 15-27
    3. Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang
      Pages 28-40
    4. Khalid Zaman Bijon, Ram Krishnan, Ravi Sandhu
      Pages 41-53
  3. Access Control

    1. Bo Tang, Ravi Sandhu
      Pages 54-69
    2. He Shuangyu, Liu Jianwei, Mao Jian, Chen Jie
      Pages 70-81
    3. Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu
      Pages 82-95
  4. Network Security

    1. Yi Tang, Piaoping Lin, Zhaokai Luo
      Pages 96-109
    2. Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
      Pages 110-123
    3. Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong et al.
      Pages 124-137
    4. Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou
      Pages 138-151
  5. Security Analysis

    1. Jakub Muszyński, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry
      Pages 152-165
    2. Xiutao Feng, Fan Zhang
      Pages 198-208
    3. Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu
      Pages 223-232
  6. Public Key Cryptography

    1. Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chongzhi Gao
      Pages 233-245
    2. Shuquan Hou, Xinyi Huang, Li Xu
      Pages 246-259
    3. Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu
      Pages 260-270
    4. Ibrahim Elashry, Yi Mu, Willy Susilo
      Pages 271-284
    5. Vandana Guleria, Ratna Dutta
      Pages 285-298
    6. Jiguo Li, Xuexia Zhao, Yichen Zhang
      Pages 299-310
    7. Weiwei Liu, Yi Mu, Guomin Yang
      Pages 323-334
  7. System Security

    1. Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve Schneider, Zhe Xia
      Pages 335-348
    2. Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu
      Pages 349-362
    3. N. Rajamanickam, R. Nadarajan, Atilla Elçi
      Pages 363-376
  8. Privacy-Preserving Systems and Bio-metrics

    1. Wei Zhou, Jiankun Hu, Song Wang, Ian Petersen, Mohammed Bennamoun
      Pages 377-388
    2. Li Xi, Dengguo Feng
      Pages 421-434
  9. Key Management and Distribution

    1. Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang
      Pages 448-461
    2. Mengmeng Ge, Kim-Kwang Raymond Choo
      Pages 462-475
  10. Short Papers

    1. Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu
      Pages 476-483
    2. Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana Cavalli
      Pages 484-492
    3. Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma
      Pages 493-500
    4. Nathalie Baracaldo, Balaji Palanisamy, James Joshi
      Pages 501-509
    5. Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma
      Pages 510-517
    6. Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan
      Pages 518-525
    7. Jingwan Zhang, Yiming Zhao
      Pages 526-533
    8. Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong
      Pages 534-541
    9. Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun
      Pages 550-557
    10. Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
      Pages 558-565
    11. Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao
      Pages 566-573
  11. Back Matter

Other volumes

  1. Network and System Security
    8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings
  2. 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings

About these proceedings

Introduction

This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014.
The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.

Keywords

P2P Botnet Web page identification access control attribute-based signature authentication biometrics cloud computing computer networks cryptanalysis and other attacks cryptographic protocols encryption firewall key management multivariate cryptography network security privacy protections software and application security systems security trust

Editors and affiliations

  • Man Ho Au
    • 1
  • Barbara Carminati
    • 2
  • C.-C. Jay Kuo
    • 3
  1. 1.Department of ComputingHong Kong Polytechnic UniversityKowloonHong Kong
  2. 2.Department of Computer Science and CommunicationUniversity of InsubriaVareseItaly
  3. 3.Ming Hsieh Department of Electrical EngineeringUniversity of Southern CaliforniaLos AngelesUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-11698-3
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-11697-6
  • Online ISBN 978-3-319-11698-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering