Advertisement

Network and System Security

7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings

  • Javier Lopez
  • Xinyi Huang
  • Ravi Sandhu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Table of contents

  1. NSS 2013 Short Papers

    1. Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng
      Pages 642-648
    2. Julien Bringer, Hervé Chabanne, Alain Patey
      Pages 649-655
    3. Raphael Spreitzer, Thomas Plos
      Pages 656-662
    4. Fan Zhang, Hua Guo, Zhoujun Li
      Pages 663-670
    5. Jörg Daubert, Mathias Fischer, Stefan Schiffner, Max Mühlhäuser
      Pages 685-691
    6. Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale
      Pages 692-698
  2. NSS 2013 Industrial Track Papers

    1. Jorge de-la-Peña-Sordo, Igor Santos, Iker Pastor-López, Pablo G. Bringas
      Pages 707-713
    2. Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto
      Pages 714-720
    3. Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay
      Pages 721-727
    4. Jason Cohen, Subatra Acharya
      Pages 735-741
    5. Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino
      Pages 749-755
    6. Wei Zhou, Jiankun Hu, Ian Petersen, Mohammed Bennamoun
      Pages 756-762
    7. Sheng Wen, Yang Xiang, Wanlei Zhou
      Pages 763-769
    8. Daniele Midi, Ashish Kundu, Elisa Bertino
      Pages 777-783
    9. Wencheng Yang, Jiankun Hu, Song Wang
      Pages 784-790
  3. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Keywords

RFID attribute-based signature computer networks encryption vehicular ad-hoc networks

Editors and affiliations

  • Javier Lopez
    • 1
  • Xinyi Huang
    • 2
  • Ravi Sandhu
    • 3
  1. 1.Computer Science Department, ETSI InformaticaUniversity of MalagaMalagaSpain
  2. 2.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  3. 3.Institute for Cyber Security,University of Texas at San AntonioSan AntonioUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-38631-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38630-5
  • Online ISBN 978-3-642-38631-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering