Network and System Security

10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings

  • Jiageng Chen
  • Vincenzo Piuri
  • Chunhua Su
  • Moti Yung
Conference proceedings NSS 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9955)

Also part of the Security and Cryptology book sub series (LNSC, volume 9955)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Invited Paper

    1. Front Matter
      Pages 1-1
    2. Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu
      Pages 3-18
  3. Authentication Mechanism

    1. Front Matter
      Pages 19-19
    2. Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Mirosław Kutyłowski
      Pages 21-36
    3. Jia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai
      Pages 37-46
    4. Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun
      Pages 47-61
  4. Cloud Computing Security

  5. Data Mining for Security Application

    1. Front Matter
      Pages 111-111
    2. Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang
      Pages 113-125
    3. Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis
      Pages 126-139
  6. Digital Signature

    1. Front Matter
      Pages 141-141
    2. Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo
      Pages 156-167
  7. Privacy-Preserving Technologies

    1. Front Matter
      Pages 169-169
    2. Yosuke Ishikuro, Kazumasa Omote
      Pages 171-183
    3. Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao
      Pages 184-199
    4. Ishai Rosenberg, Ehud Gudes
      Pages 200-216
  8. Network Security and Forensic

    1. Front Matter
      Pages 217-217
    2. Nikolai Hampton, Zubair A. Baig
      Pages 235-248
  9. Searchable Encryption

    1. Front Matter
      Pages 249-249
    2. Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun
      Pages 283-299
  10. Security Policy and Access Control

    1. Front Matter
      Pages 301-301
    2. Prosunjit Biswas, Ravi Sandhu, Ram Krishnan
      Pages 303-317
  11. Security Protocols

    1. Front Matter
      Pages 347-347
    2. Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai
      Pages 363-379
  12. Symmetric Key Cryptography

    1. Front Matter
      Pages 381-381
    2. Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam
      Pages 383-397
  13. System Security

    1. Front Matter
      Pages 413-413
    2. Qiumao Ma, Wensheng Zhang, Jinsheng Zhang
      Pages 415-432
    3. Wenjuan Li, Weizhi Meng, Lam-For Kwok, Horace Ho Shing Ip
      Pages 433-449
    4. Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap
      Pages 450-463
  14. Web Security

    1. Front Matter
      Pages 465-465
    2. Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani
      Pages 467-482
    3. Bailin Xie, Yu Wang, Chao Chen, Yang Xiang
      Pages 483-496
  15. Data Mining for Security Application (Short Paper)

    1. Front Matter
      Pages 497-497
    2. Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo
      Pages 499-506
  16. Provable Security (Short Paper)

    1. Front Matter
      Pages 507-507
    2. Kewei Lv, Wenjie Qin, Ke Wang
      Pages 509-516
  17. Security Protocol (Short Paper)

    1. Front Matter
      Pages 517-517

About these proceedings


This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016. 
The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system security; Web security. The volume also contains one invited paper.


access control authentication cloud computing computer crime computer forensics cryptography data mining digital signatures encryption information retrieval machine learning mobile computing network security public key cryptography security security protocols system security telecommunication networks user privacy World Wide Web

Editors and affiliations

  • Jiageng Chen
    • 1
  • Vincenzo Piuri
    • 2
  • Chunhua Su
    • 3
  • Moti Yung
    • 4
  1. 1.Central China Normal University WuhanChina
  2. 2.Università degli Studi di Milano Crema (CR)Italy
  3. 3.Osaka University OsakaJapan
  4. 4.Columbia University New YorkUSA

Bibliographic information

Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment