|
|
|
An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms |
|
|
3 | (20) |
|
|
|
|
Practical DoS Attacks on Embedded Networks in Commercial Vehicles |
|
|
23 | (22) |
|
|
|
|
|
|
|
|
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment |
|
|
45 | (21) |
|
|
|
|
SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing |
|
|
66 | (23) |
|
|
|
Authorization and Information Flow Control |
|
|
|
Building a Fair System Using Access Rights |
|
|
89 | (20) |
|
|
|
|
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? |
|
|
109 | (22) |
|
|
|
Data Loss Prevention Based on Text Classification in Controlled Environments |
|
|
131 | (20) |
|
|
|
|
|
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications |
|
|
151 | (24) |
|
|
|
Cryptosystem and Protocols |
|
|
|
An Efficient Certificateless Signature Scheme in the Standard Model |
|
|
175 | (18) |
|
|
|
Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption |
|
|
193 | (19) |
|
|
|
Enhanced Modulo Based Multi Secret Image Sharing Scheme |
|
|
212 | (13) |
|
|
|
|
Performance Evaluation of Modified Henon Map in Image Encryption |
|
|
225 | (18) |
|
|
|
|
Network Security and Intrusion Detection |
|
|
|
Network Counter-Attack Strategy by Topology Map Analysis |
|
|
243 | (20) |
|
|
Network Vulnerability Analysis Using a Constrained Graph Data Model |
|
|
263 | (20) |
|
|
|
|
Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid |
|
|
283 | (20) |
|
|
|
|
|
|
A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations |
|
|
303 | (21) |
|
|
|
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems" |
|
|
324 | (12) |
|
|
|
|
Privacy Preserving Network Analysis of Distributed Social Networks |
|
|
336 | (23) |
|
|
|
|
|
|
Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data |
|
|
359 | (13) |
|
|
|
Risk Evaluation of X.509 Certificates -- A Machine Learning Application |
|
|
372 | (21) |
|
|
|
|
|
Wireless, Mobile and IoT Security |
|
|
|
A Secure Routing Scheme for Wireless Mesh Networks |
|
|
393 | (16) |
|
|
|
|
|
Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches |
|
|
409 | (17) |
|
|
|
|
Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks |
|
|
426 | (18) |
|
|
|
|
|
JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET |
|
|
444 | (17) |
|
|
|
|
|
A Solution to Detect Phishing in Android Devices |
|
|
461 | (10) |
|
|
|
Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic |
|
|
471 | (8) |
|
|
|
|
Honeypot Deployment in Broadband Networks |
|
|
479 | (10) |
|
|
|
|
|
Generic Construction of Certificateless Signcryption Scheme |
|
|
489 | (10) |
|
|
|
Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme |
|
|
499 | (10) |
|
|
|
Towards Useful Anomaly Detection for Back Office Networks |
|
|
509 | (12) |
|
|
|
|
Detection of SQLite Database Vulnerabilities in Android Apps |
|
|
521 | (11) |
|
|
|
|
|
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach |
|
|
532 | (11) |
|
|
|
|
Author Index |
|
543 | |