Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings
tarafından
Liu, Joseph K. editor. (orcid)0000-0001-6656-6240
Başlık
:
Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings
Yazar
:
Liu, Joseph K. editor. (orcid)0000-0001-6656-6240
ISBN
:
9783030369385
Edisyon
:
1st ed. 2019.
Fiziksel Niteleme
:
XIII, 731 p. 264 illus., 143 illus. in color. online resource.
Seri
:
Security and Cryptology ; 11928
İçindekiler
:
Invited Papers -- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks -- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation -- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey -- A Graph Database-based Approach to Analyze Network Log Files -- Full Papers -- A Privacy-Enhancing Framework for Internet of Things Services -- Using Audio Characteristics for Mobile Device Authentication -- Ethereum Analysis via Node Clustering -- Strong Known Related-Key Attacks and the Security of ECDSA -- Threat Assessment of Enterprise Applications via Graphical Modelling -- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing -- Towards Secure Open Banking Architecture: An Evaluation with OWASP -- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms -- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters -- LaT-Voting: Traceable Anonymous E-Voting on Blockchain -- Distributed Secure Storage System Based on Blockchain and TPA -- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique -- A Practical Dynamic Enhanced BFT protocol -- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals -- Detecting Intruders by User File Access Patterns -- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture -- Privacy Preserving Machine Learning with Limited Information Leakage -- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained -- Sequential Aggregate MACs with Detecting Functionality Revisited -- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System -- EEG-based Authentication with Variational Universal Background Model -- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts -- A Comparative Study on Network Traffic Clustering -- Tell Them From Me: an Encrypted Application Profiler -- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP -- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies -- Difficulty of decentralized structure due to rational user behavior on Blockchain -- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis of Raindrop and FBC -- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption -- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost -- Lattice based verifiably encrypted double authentication preventing Signatures -- Privacy-Preserving Sequential Data Publishing -- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter -- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks -- SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform -- Short Papers -- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol -- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices -- Privacy-preserving k-means clustering: an application to driving style Recognition -- Derandomized PACE with Mutual Authentication -- A Muti-attributes-based Trust Model of Internet of Vehicle -- Using Sparse Composite Document Vectors to Classify VBA Macros -- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications.
Özet
:
This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
Konu Başlığı
:
Computer security.
Data encryption (Computer science).
Computer organization.
Artificial intelligence.
Application software.
Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28060
Cryptology. https://scigraph.springernature.com/ontologies/product-market-codes/I28020
Computer Systems Organization and Communication Networks. https://scigraph.springernature.com/ontologies/product-market-codes/I13006
Artificial Intelligence. https://scigraph.springernature.com/ontologies/product-market-codes/I21000
Information Systems Applications (incl. Internet). https://scigraph.springernature.com/ontologies/product-market-codes/I18040
Yazar Ek Girişi
:
Liu, Joseph K.
Huang, Xinyi.
Ek Kurum Yazar
:
SpringerLink (Online service)
Elektronik Erişim
:
Materyal Türü | Barkod | Yer Numarası | Durumu/İade Tarihi |
---|
Electronic Book | 429196-1001 | QA76.9 .A25 | Springer E-Book Collection |