NSS2012 Academic Track Accepted Papers (LNCS 7645)

Number of Submissions: 173
Number of Accepted Papers: 39

Network Security

1. “Enhancing List-based Packet Filter using IP Verification Mechanism against IP Spoofing Attack
     in Network Intrusion Detection”

Yuxin Meng and Lam-for Kwok

2. “On the Automated Analysis of Safety in Usage Control: A New Decidability Result”

Silvio Ranise and Alessandro Armando

3. “Attestation of Mobile Baseband Stacks”

Steffen Wagner, Sascha Wessel, and Frederic Stumpf

4. “A Scalable Link Model for Local Optical Wireless Networks”

Tae-Gyu Lee and Gi-Soo Chung

5. “Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-net”

Long-Hai Li, Cheng-Qiang Huang, and Shao-Feng Fu

6. “Resilience Strategies for Networked Malware Detection and Remediation”

Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, and Alberto Schaeffer-Filho

7. “Detecting Spammers via Aggregated Historical Data Set”

Eitan Menahem, Rami Pusiz, and Yuval Elovici

System Security

8. “Addressing Situational Awareness in Critical Domains of a Smart Grid”

Cristina Alcaraz and Javier Lopez

9. “Identifying OS Kernel Objects for Run-time Security Analysis”

Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, and Mohamed Almorsy

10. “Background Transfer Method for Ubiquitous Computing”

Tae-Gyu Lee and Gi-Soo Chung

11. “Operating System Kernel Data Disambiguation to Support Security Analysis”

Amani S. Ibrahim, John Grundy, James Hamlyn-Harris, and Mohamed Almorsy

12. “FlexCOS: An open Smartcard Platform for Research and Education”

Kristian Beilke and Volker Roth

13. “Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-based 
        Massively Multiplayer Online Games”

Willy Susilo, Yang-Wai Chow, and Rungrat Wiangsripanawan

14. “Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques”

Lukasz Krzywiecki and Miroslaw Kutylowski

Public Key Cryptography

15. “Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption”

Shengli Liu, Fangguo Zhang, and Kefei Chen

16. “Proxy Signature Scheme Based on Isomorphisms of Polynomials”

Shaohua Tang and Lingling Xu

17. “Universal Designated Verifier Signcryption”

Fei Tang, Changlu Lin, and Pinhui Ke

18. “Practical Certificateless Public Key Encryption in the Standard Model”

Wenjie Yang, Futai Zhang, and Limin Shen

19. “(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack”

Yunmei Zhang, Man Ho Au, Guomin Yang, and Willy Susilo

20. “Direct CCA Secure Identity-based Broadcast Encryption”

Leyou Zhang, Qing Wu, and Yupu Hu

21. “A Communication Efficient Group Key Distribution Scheme for MANETs”

Yang Yang

Privacy

22. “A Bird's Eye View on the I2P Anonymous File-sharing Environment”

Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor

23. “A Clustering-based Approach for Personalized Privacy Preserving Publication of Moving
      Object Trajectory Data”

Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, and Hassan Mahdikhani

24. “Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity”

Alif Wahid, Christopher Leckie, and Chenfeng Zhou

25. “Differential Privacy Data Release through Adding Noise on Average Value”

Xilin Zhang, Yingjie Wu, and Xiaodong Wang

26. “Private Friends on a Social Networking Site Operated by an Overly Curious SNP”

Roman Schlegel and Duncan S. Wong

27. “Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks”

Sushama Karumanchi, Anna Squicciarini and Dan Lin

Authentication

28. “Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks”

Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, and Jiaxiang Quan

29. “An Improved Authentication Scheme for H.264/SVC and its Performance Evaluation over Non-stationary
      Wireless Mobile Networks”

Yifan Zhao, Swee-Won Lo, Robert H. Deng, and Xuhua Ding

30. “The Performance of Public Key-based Authentication Protocols”

Kaiqi Xiong

31. “Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server
        Architecture”

Ding Wang, Chun-guang Ma, De-li Gu ,and Zhen-shan Cui

32. “A Secure and Private RFID Authentication Protocol under SLPN Problem”

Mohammad S. I. Mamun, Atsuko Miyaji, and Mohammad S. Rahman

Security Analysis

33. “Cryptanalysis of Exhaustive Search on Attacking RSA”

Mu-En Wu, Raylin Tso, and Hung-Min Sun

34. “On the Improvement of Fermat Factorization”

Mu-En Wu, Raylin Tso, and Hung-Min Sun

35. “Impossible Differential Cryptanalysis on Tweaked E2”

Yuechuan Wei, Xiaoyuan Yang, Chao Li, and Weidong Du

36. “Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems With Channel Errors”

Jing Guo and Zhuxiao Wang

Access Control

37. “Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud”

Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, and Zheli Liu

38. “Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks”

Huimin Shuai and Wen Tao Zhu

39. “Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access
       Control (RBAC)”

Nima Mousavi and Mahesh V. Tripunitara