Advertisement

Network and System Security

7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings

  • Javier Lopez
  • Xinyi Huang
  • Ravi Sandhu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Table of contents

  1. Front Matter
  2. NSS 2013 Regular Papers

    1. Network Security: Modeling and Evaluation

      1. Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro
        Pages 1-13
      2. Fudong Li, Nathan Clarke, Steven Furnell
        Pages 14-25
      3. Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi
        Pages 54-67
    2. Network Security: Security Protocols and Practice

      1. Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé
        Pages 80-93
      2. Sashi Gurung, Dan Lin, Anna Squicciarini, Elisa Bertino
        Pages 94-108
      3. Christoph Krauß, Volker Fusenig
        Pages 109-121
    3. Network Security: Network Attacks and Defense

      1. Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
        Pages 122-134
      2. James Kirrage, Asiri Rathnayake, Hayo Thielecke
        Pages 135-148
      3. Gabriel Cartier, Jean-François Cartier, José M. Fernandez
        Pages 149-163
      4. Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias
        Pages 164-177
    4. System Security: Malware and Intrusions

      1. Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo G. Bringas
        Pages 178-191
      2. Sebastian Vogl, Fatih Kilic, Christian Schneider, Claudia Eckert
        Pages 192-205
      3. Jonas Pfoh, Christian Schneider, Claudia Eckert
        Pages 206-219
      4. Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis
        Pages 220-235
    5. System Security: Applications Security

      1. George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis
        Pages 236-249
      2. Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis
        Pages 250-263
      3. Maurizio Naldi, Marta Flamini, Giuseppe D’Acquisto
        Pages 264-277
      4. Giovanni Di Crescenzo, Jim Burns, Brian Coan, John Schultz, Jonathan Stanton, Simon Tsang et al.
        Pages 278-292
    6. System Security: Security Algorithms and Systems

      1. Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino
        Pages 293-306
      2. Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang
        Pages 307-320
      3. Suaad Alarifi, Stephen Wolthusen
        Pages 321-335
      4. Benoît Bertholon, Sébastien Varrette, Pascal Bouvry
        Pages 336-349
    7. Cryptographic Algorithms I

      1. Jiguo Li, Yanqiong Li, Yichen Zhang
        Pages 350-364
      2. Hongda Li, Qihua Niu, Bei Liang
        Pages 365-380
      3. Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang
        Pages 381-392
    8. Cryptographic Algorithms II

      1. Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
        Pages 405-423
      2. Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo
        Pages 424-438
      3. Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan
        Pages 439-450
      4. Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie
        Pages 451-464
    9. Privacy

      1. Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro Buchmann
        Pages 465-478
      2. Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang
        Pages 479-492
      3. Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
        Pages 493-506
    10. Key Agreement and Distribution

  3. NSS 2013 Short Papers

    1. Xu Huang, Salahiddin Altahat, Dat Tran, Li Shutao
      Pages 575-581
    2. Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi
      Pages 582-589
    3. Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang
      Pages 590-598
    4. James Alderman, Jason Crampton
      Pages 607-613
    5. Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador
      Pages 614-620
    6. Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig
      Pages 628-634

About these proceedings

Introduction

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Keywords

RFID attribute-based signature computer networks encryption vehicular ad-hoc networks

Editors and affiliations

  • Javier Lopez
    • 1
  • Xinyi Huang
    • 2
  • Ravi Sandhu
    • 3
  1. 1.Computer Science Department, ETSI InformaticaUniversity of MalagaMalagaSpain
  2. 2.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  3. 3.Institute for Cyber Security,University of Texas at San AntonioSan AntonioUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-38631-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38630-5
  • Online ISBN 978-3-642-38631-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering