Network and System Security

6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

  • Li Xu
  • Elisa Bertino
  • Yi Mu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7645)

Table of contents

  1. Front Matter
  2. Network Security I

  3. Network Security I

    1. Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, Mohamed Almorsy
      Pages 72-85
    2. Tae-Gyu Lee, Gi-Soo Chung
      Pages 86-99
  4. Public Key Cryptography I

    1. Shengli Liu, Fangguo Zhang, Kefei Chen
      Pages 100-112
    2. Shaohua Tang, Lingling Xu
      Pages 113-125
    3. Fei Tang, Changlu Lin, Pinhui Ke
      Pages 126-134
  5. Privacy I

    1. Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor
      Pages 135-148
    2. Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani
      Pages 149-165
    3. Alif Wahid, Christopher Leckie, Chenfeng Zhou
      Pages 166-179
  6. Authentication I

  7. Network Security II

    1. Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu
      Pages 220-232
    2. Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, Alberto Schaeffer-Filho
      Pages 233-247
    3. Eitan Menahem, Rami Pusiz, Yuval Elovici
      Pages 248-262
  8. System Security II

    1. Amani S. Ibrahim, John Grundy, James Hamlyn-Harris, Mohamed Almorsy
      Pages 263-276
    2. Kristian Beilke, Volker Roth
      Pages 277-290
    3. Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 305-319
  9. Public Key Cryptography II

    1. Wenjie Yang, Futai Zhang, Limin Shen
      Pages 320-333
    2. Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo
      Pages 334-347
    3. Leyou Zhang, Qing Wu, Yupu Hu
      Pages 348-360
  10. Security Analysis

    1. Mu-En Wu, Raylin Tso, Hung-Min Sun
      Pages 373-379
    2. Mu-En Wu, Raylin Tso, Hung-Min Sun
      Pages 380-391
    3. Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du
      Pages 392-404
  11. Privacy II

    1. Xilin Zhang, Yingjie Wu, Xiaodong Wang
      Pages 417-429
    2. Sushama Karumanchi, Anna Squicciarini, Dan Lin
      Pages 445-461
  12. Authentication II

    1. Mohammad S. I. Mamun, Atsuko Miyaji, Mohammad S. Rahman
      Pages 476-489
  13. Access Control

  14. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.

The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.


attacks authentication protocols cloud computing cryptanalysis wireless networks

Editors and affiliations

  • Li Xu
    • 1
  • Elisa Bertino
    • 2
  • Yi Mu
    • 3
  1. 1.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  2. 2.Department of Computer Science, CERIAS and Cyber CenterPurdue UniversityWest LafayetteUSA
  3. 3.School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34600-2
  • Online ISBN 978-3-642-34601-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software