NSS2012 Academic Track Accepted Papers (LNCS 7645)
Number of Submissions: 173
Number of Accepted Papers: 39
Network Security
1. “Enhancing List-based Packet Filter using IP Verification Mechanism against IP Spoofing Attack |
Yuxin Meng and Lam-for Kwok |
2. “On the Automated Analysis of Safety in Usage Control: A New Decidability Result” |
Silvio Ranise and Alessandro Armando |
3. “Attestation of Mobile Baseband Stacks” |
Steffen Wagner, Sascha Wessel, and Frederic Stumpf |
4. “A Scalable Link Model for Local Optical Wireless Networks” |
Tae-Gyu Lee and Gi-Soo Chung |
5. “Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-net” |
Long-Hai Li, Cheng-Qiang Huang, and Shao-Feng Fu |
6. “Resilience Strategies for Networked Malware Detection and Remediation” |
Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, and Alberto Schaeffer-Filho |
7. “Detecting Spammers via Aggregated Historical Data Set” |
Eitan Menahem, Rami Pusiz, and Yuval Elovici |
System Security
8. “Addressing Situational Awareness in Critical Domains of a Smart Grid” |
Cristina Alcaraz and Javier Lopez |
9. “Identifying OS Kernel Objects for Run-time Security Analysis” |
Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, and Mohamed Almorsy |
10. “Background Transfer Method for Ubiquitous Computing” |
Tae-Gyu Lee and Gi-Soo Chung |
11. “Operating System Kernel Data Disambiguation to Support Security Analysis” |
Amani S. Ibrahim, John Grundy, James Hamlyn-Harris, and Mohamed Almorsy |
12. “FlexCOS: An open Smartcard Platform for Research and Education” |
Kristian Beilke and Volker Roth |
13. “Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-based |
Willy Susilo, Yang-Wai Chow, and Rungrat Wiangsripanawan |
14. “Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques” |
Lukasz Krzywiecki and Miroslaw Kutylowski |
Public Key Cryptography
15. “Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption” |
Shengli Liu, Fangguo Zhang, and Kefei Chen |
16. “Proxy Signature Scheme Based on Isomorphisms of Polynomials” |
Shaohua Tang and Lingling Xu |
17. “Universal Designated Verifier Signcryption” |
Fei Tang, Changlu Lin, and Pinhui Ke |
18. “Practical Certificateless Public Key Encryption in the Standard Model” |
Wenjie Yang, Futai Zhang, and Limin Shen |
19. “(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack” |
Yunmei Zhang, Man Ho Au, Guomin Yang, and Willy Susilo |
20. “Direct CCA Secure Identity-based Broadcast Encryption” |
Leyou Zhang, Qing Wu, and Yupu Hu |
21. “A Communication Efficient Group Key Distribution Scheme for MANETs” |
Yang Yang |
Privacy
22. “A Bird's Eye View on the I2P Anonymous File-sharing Environment” |
Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor |
23. “A Clustering-based Approach for Personalized Privacy Preserving Publication of Moving |
Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, and Hassan Mahdikhani |
24. “Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity” |
Alif Wahid, Christopher Leckie, and Chenfeng Zhou |
25. “Differential Privacy Data Release through Adding Noise on Average Value” |
Xilin Zhang, Yingjie Wu, and Xiaodong Wang |
26. “Private Friends on a Social Networking Site Operated by an Overly Curious SNP” |
Roman Schlegel and Duncan S. Wong |
27. “Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks” |
Sushama Karumanchi, Anna Squicciarini and Dan Lin |
Authentication
28. “Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks” |
Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, and Jiaxiang Quan |
29. “An Improved Authentication Scheme for H.264/SVC and its Performance Evaluation over Non-stationary |
Yifan Zhao, Swee-Won Lo, Robert H. Deng, and Xuhua Ding |
30. “The Performance of Public Key-based Authentication Protocols” |
Kaiqi Xiong |
31. “Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server |
Ding Wang, Chun-guang Ma, De-li Gu ,and Zhen-shan Cui |
32. “A Secure and Private RFID Authentication Protocol under SLPN Problem” |
Mohammad S. I. Mamun, Atsuko Miyaji, and Mohammad S. Rahman |
Security Analysis
33. “Cryptanalysis of Exhaustive Search on Attacking RSA” |
Mu-En Wu, Raylin Tso, and Hung-Min Sun |
34. “On the Improvement of Fermat Factorization” |
Mu-En Wu, Raylin Tso, and Hung-Min Sun |
35. “Impossible Differential Cryptanalysis on Tweaked E2” |
Yuechuan Wei, Xiaoyuan Yang, Chao Li, and Weidong Du |
36. “Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems With Channel Errors” |
Jing Guo and Zhuxiao Wang |
Access Control
37. “Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud” |
Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, and Zheli Liu |
38. “Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks” |
Huimin Shuai and Wen Tao Zhu |
39. “Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access |
Nima Mousavi and Mahesh V. Tripunitara |