|
Sponsored by
|
Program
Download PDF: NSS 2014 Program
Details
15.10.2014
- Registration (8:30-9:30)
- Opening remarks (9:30-10:00)
- Keynote 1 (10:00-11:00) (Chair: Yang Xiang)
- Coffee Break (11:00-11:30)
- Keynote 2 (11:30-12:30) (Chair: Ravi Sandhu)
- Break for lunch (12:30-14:00)
- Session A1: Cloud Computing (14:00-16:05)
Chair: Man Ho Au
- Coffee break (16:05-16:30)
- Session A2: Access Control (16:30-18:35)
Chair: Barbara Carminati
- Dinner (18:35-21:00)
16.10.2014
- Session A3: Network Security (8:30-10:35)
Chair: Joseph K. Liu
- psOBJ: Defending against Traffic Analysis with pseudo-Objects (8:30-8:55)
Yi Tang, Piaoping Lin and Luo Zhaokai
- Universally Composable secure TNC protocol based on IF-T binding to TLS (8:55-9:20)
Shijun Zhao, Qianying Zhang and Feng Dengguo
- Revisiting Node Injection of P2P Botnet (9:20-9:45)
Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li and Dengguo Feng
- On addressing the imbalance problem: A correlated KNN approach for network traffic classification (9:45-10:10)
Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang and Wanlei Zhou.
- An entropy approach to anomaly-based network attack detection in network forensics (10:10-10:35)
Khoa Nguyen, Dat Tran, Wanli Ma and Dharmendra Sharma
- Coffee break (10:35-10:55)
- Session A4: Security Analysis I (10:55-12:35)
Chair: Yong Yu
- Lunch break (12:35-14:00)
- Session A5: PKC I (14:00-16:05)
Chair: Hasini Gunasinghe
- Coffee break (16:05-16:30)
- Session A6: System Security (16:30-18:35)
Chair: Hung-Min Sun
- Dinner (18:35-21:00)
17.10.2014
- Invited talk (8:00-9:00) (Chair: Xiaofeng Chen)
- Coffee break (9:00-9:20)
- Session A7: PKC II (9:20-12:15)
Chair: Xinyi Huang
- Lunch Break (12:15-14:00)
- Session A8: Privacy-Preserving and Key Distribution (14:00-16:30)
Chair: Qianhong Wu
- Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features (14:00-14:25)
Wei Zhou, Jiankun Hu, Song Wang, Ian Petersen and Mohammed Bennamoun
- Privacy Preserving Biometrics-Based and User Centric Authentication Protocol (14:25-14:50)
Hasini Gunasinghe and Elisa Bertino
- eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (14:50-15:15)
Tapas Pandit, Rana Barua and Somanath Tripathy
- Efficient Sub-/Inter-Group Key Distribution for Ad Hoc Networks (15:15-15:40)
Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi and Bin Liang
- A novel hybrid key revocation scheme for wireless sensor networks (15:40-16:05)
Mengmeng Ge and Kim-Kwang Raymond Choo
- A proposed approach to compound file fragment identification (16:05-16:30)
Khoa Nguyen, Dat Tran, Wanli Ma and Dharmendra Sharma
- Coffee break (16:30-17:00)
- Session A9: Security Analysis II (17:00-19:05)
Chair: Jin Li
- Dinner (19:05-21:00)
|
|