NSS 2012 Industry Track Papers, published in International Journal of Grid and Utility Computing (IJGUC)
1. “Linear Threshold Verifiable Secret Sharing in Bilinear Groups” |
Jie Zhang and Futai Zhang |
2. “ Leakage-Resilient Identity-Based Encryption Scheme” |
Li Sujuan and Zhang Futai |
3. “Anti-Cropping Digital Image Watermarking Using Sudoku” |
Shamsul Kamal Ahmad Khalid, Mustafa Mat Deris and Kamarudin Malik Mohamad |
4. “Secure and Efficient Design of Software Block Cipher Implementations on Microcontrollers” |
Alessandro Barenghi, Gerardo Pelosi and Federico Terraneo |
5. “An efficient attribute-based signature scheme with claim-predicate mechanism” |
Changji Wang and Wentao Li |
6. “Strand Spaces Analysis of Electronic Commerce Protocols” |
Yichun Liu and Huanguo Zhang |
7. “Fine-grained Access Control for Cloud Computing” |
Xinfeng Ye |
8. “A Novel Vulnerability Detection Method for ZigBee MAC Layer” |
Siwei Peng, Baojiang Cui, Ru Jia, Yiying Zhang and Shurui Liang |
9. “How Network Coding System Constrains Packet Pollution Attacks in Wireless Sensor Networks” |
Yuanyuan Zhang and Marine Minier |
10. “Hierarchical Identity-Based Encryption without Key Delegation in Decryption” |
Song Luo and Zhong Chen |
11. “Privacy-Preserving Logistic Regression Outsourcing in Cloud Computing” |
Xudong Zhu and Hui Li |
12. “ FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA Algebra with Test” |
Guangye Sui and Mohamed Mejri |
13. “Access control requirements for structured document in cloud computing |
Jinbo Xiong, Zhiqiang Yao and Jianfeng Ma |
14. “Visual Model Detecting Spam Emails” |
Jinson Zhang, Mao Lin Huang and Doan Hoang |
15. “ Scrutinizing Well-known Countermeasures against Clone Node Attack in Mobile Wireless |
Wazir Zada Khan, Mohamad Naufal Mohamad Saad and Mohammed Y Aalsalem |