Advertisement

Network and System Security

9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings

  • Meikang Qiu
  • Shouhuai Xu
  • Moti Yung
  • Haibo Zhang

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9408)

Also part of the Security and Cryptology book sub series (LNSC, volume 9408)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Wireless Security and Privacy

    1. Front Matter
      Pages 1-1
    2. Wei Wang, Mikhail Istomin, Jeffrey Bickford
      Pages 3-17
    3. Brian Ricks, Patrick Tague
      Pages 32-45
    4. Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani
      Pages 46-59
  3. Smartphone Security

    1. Front Matter
      Pages 61-61
    2. Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez
      Pages 63-77
    3. Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani
      Pages 78-91
  4. Systems Security

    1. Front Matter
      Pages 93-93
    2. Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson
      Pages 95-111
    3. Javid Habibi, Ajay Panicker, Aditi Gupta, Elisa Bertino
      Pages 112-129
    4. Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Riha, Vashek Matyas
      Pages 130-143
  5. Application Security

    1. Front Matter
      Pages 145-145
    2. Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni
      Pages 162-175
  6. Security Management

    1. Front Matter
      Pages 189-189
    2. Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi
      Pages 191-205
    3. Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub
      Pages 221-235
  7. Applied Cryptography

    1. Front Matter
      Pages 237-237
    2. Qingji Zheng, Xiangxue Li, Aytac Azgin
      Pages 239-253
    3. Jinsheng Zhang, Wensheng Zhang, Daji Qiao
      Pages 268-282
    4. Kamil Kluczniak, Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
      Pages 283-299
  8. Cryptosystems

    1. Front Matter
      Pages 301-301
    2. Fuqun Wang, Kunpeng Wang, Bao Li
      Pages 303-315
    3. Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao
      Pages 345-356
  9. Short Papers: Cryptographic Mechanisms

    1. Front Matter
      Pages 357-357
    2. Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad
      Pages 359-367
    3. Atsuko Miyaji, Shohei Nishida
      Pages 376-385
    4. Zhiguo Wan, Robert H. Deng, David Lee
      Pages 386-394
  10. Short Papers: Security Mechanisms

    1. Front Matter
      Pages 403-403
    2. Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, Jing Jin
      Pages 405-417
    3. Javier Baliosian, Ana Cavalli
      Pages 418-427
    4. Jean-Michel Cioranesco, Craig Hampel, Guilherme Ozari de Almeida, Rodrigo Portella do Canto
      Pages 428-438
    5. Christian Callegari, Stefano Giordano, Michele Pagano
      Pages 439-446
  11. Short Papers: Mobile and Cloud Security

    1. Front Matter
      Pages 447-447
    2. Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang
      Pages 467-474
    3. Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford
      Pages 475-487
    4. Abdulaziz Aldribi, Issa Traore
      Pages 488-500
  12. Short Papers: Application and Network Security

    1. Front Matter
      Pages 501-501
    2. Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes
      Pages 503-510

Other volumes

  1. 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings
  2. Network and System Security
    9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings

About these proceedings

Introduction

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015.

The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

 

 

Keywords

anomaly detection cloud security network security security management wireless security access control application security applied cryptography biometrics cloud computing computer networks encryption firewall key management mobile security privacy smartphone security software and application security systems security trust management

Editors and affiliations

  • Meikang Qiu
    • 1
  • Shouhuai Xu
    • 2
  • Moti Yung
    • 3
  • Haibo Zhang
    • 4
  1. 1.Apt. 2ANEW YORKUSA
  2. 2.University of TexasSan AntonioUSA
  3. 3.Dept. of Computer ScienceColumbia UniversityNew YorkUSA
  4. 4.University of OtagoDunedinNew Zealand

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-25645-0
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-25644-3
  • Online ISBN 978-3-319-25645-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering