Atjaunināt sīkdatņu piekrišanu

E-grāmata: International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Edited by , Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers.The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for

emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

Security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks.- network intrusion detection and prevention, firewalls, packet filters.- malware, and distributed denial of service.- communication privacy and anonymity.- network and internet forensics techniques.- public key infrastructures, key management, credential management.- secure routing, naming/addressing, network management.- security and privacy in pervasive and ubiquitous computing.- security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems.- security & isolation in data center networks.- security & isolation in software defined networking.
Cloud Computing Security
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks
3(21)
Xiaoyan Sun
Jun Dai
Anoop Singhal
Peng Liu
A Secure Architecture for Inter-cloud Virtual Machine Migration
24(12)
Tayyaba Zeb
Abdul Ghafoor
Awais Shibli
Muhammad Yousaf
STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds
36(9)
Jingwei Li
Dan Lin
Anna Squicciarini
Chunfu Jia
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability
45(10)
Zhangjie Fu
Jiangang Shu
Xingming Sun
Policy Driven Node Selection in MapReduce
55(20)
Anna C. Squicciarini
Dan Lin
Smitha Sundareswaran
Jingwei Li
Authentication and Identity
GridMap: Enhanced Security in Cued-Recall Graphical Passwords
75(20)
Nicolas Van Balen
Haining Wang
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts
95(10)
Yazhe Wang
Mingming Hu
Chen Li
TPM-Based Authentication Mechanism for Apache Hadoop
105(18)
Issa Khalil
Zuochao Dou
Abdallah Khreishah
An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
123(9)
Sarmadullah Khan
Rafiullah Khan
Inam Bari
Naveed Jan
Social Authentication Identity: An Alternate to Internet Real Name System
132(9)
Chengcheng Shao
Liang Chen
Shuo Fan
Xinwen Jiang
On the Usability of Two-Factor Authentication
141(12)
Ding Wang
Ping Wang
Network Security
Securing Resource Discovery in Content Hosting Networks
153(21)
Sushama Karumanchi
Jingwei Li
Anna Squicciarini
Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations
174(9)
Pieter Burghouwt
Marcel Spruit
Henk Sips
Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems
183(12)
Kan Chen
Peidong Zhu
Yueshan Xiong
Privacy and Wireless Security
Anonymous Publish-Subscribe Systems
195(17)
Binh Vo
Steven Bellovin
Friendly Jamming for Secure Localization in Vehicular Transportation
212(10)
Bhaswati Deka
Ryan M. Gerdes
Ming Li
Kevin Heaslip
Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks
222(17)
Eirini Karapistoli
Panagiotis Sarigiannidis
Anastasios A. Economides
Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication
239(20)
Max Suraev
System and Software Security
A Simple and Novel Technique for Counteracting Exploit Kits
259(19)
Byungho Min
Vijay Varadharajan
Policy Enforcement Point Model
278(9)
Yosra Ben Mustapha
Herve Debar
Gregory Blanc
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing
287(18)
Haoyu Ma
Xinjie Ma
Weijie Liu
Zhipeng Huang
Debin Gao
Chunfu Jia
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients
305(18)
Quanwei Cai
Jingqiang Lin
Fengjun Li
Qiongxiao Wang
Daren Zha
SCADS: Separated Control- and Data-Stacks
323(20)
Christopher Kugler
Tilo Muller
Crypto
Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware
343(19)
Qianying Zhang
Shijun Zhao
Yu Qin
Dengguo Feng
TST: A New Randomness Test Method Based on Coupon Collector's Problem
362(12)
Qinglong Zhang
Zongbin Liu
Quanwei Cai
Ji Xiang
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy
374(21)
Boyang Wang
Yantian Hou
Ming Li
Haitao Wang
Hui Li
Fenghua Li
Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos
395(10)
Yuling Luo
Junxiu Liu
Lvchen Cao
Jinjie Bi
Senhui Qiu
An Information-Theoretic Approach for Secure Protocol Composition
405(22)
Yi-Ting Chiang
Tsan-Sheng Hsu
Churn-Jung Liau
Yun-Ching Liu
Chih-Hao Shen
Da-Wei Wang
Justin Zhan
Mobile Security
Towards a Systematic Study of the Covert Channel Attacks in Smartphones
427(9)
Swarup Chandra
Zhiqiang Lin
Ashish Kundu
Latifur Khan
DroidKin: Lightweight Detection of Android Apps Similarity
436(18)
Hugo Gonzalez
Natalia Stakhanova
Ali A. Ghorbani
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme
454(9)
Lulu Zhang
Yongzheng Zhang
Tianning Zang
Defending Blind DDoS Attack on SDN Based on Moving Target Defense
463(18)
Duohe Ma
Zhen Xu
Dongdai Lin
Function Escalation Attack
481(17)
Chen Cao
Yuqing Zhang
Qixu Liu
Kai Wang
RAMSES: Revealing Android Malware Through String Extraction and Selection
498(9)
Lautaro Dolberg
Quentin Jerome
Jerome Francois
Radu State
Thomas Engel
Detecting Mobile Malware with TMSVM
507(12)
Xi Xiao
Xianni Xiao
Yong Jiang
Qing Li
Posters
Research on Credible Regulation Mechanism for the Trading of Digital Works
519(5)
Guozhen Shi
Ying Shen
Fenghua Li
Mang Su
Dong Liu
Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks
524(6)
Lea Samarji
Nora Cuppens-Boulahia
Frederic Cuppens
Serge Papillon
Wael Kanoun
Samuel Dubus
Domain Algorithmically Generated Botnet Detection and Analysis
530(5)
Xiaolin Xu
Yonglin Zhou
Qingshan Li
Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy
535(6)
Jinqiao Shi
Xiao Wang
Binxing Fang
Qingfeng Tan
Li Guo
Hybrid Detection Using Permission Analysis for Android Malware
541(5)
Haofeng Jiao
Xiaohong Li
Lei Zhang
Guangquan Xu
Zhiyong Feng
Content Security Scheme for Content Centric Networks
546(5)
Fawad Khan
Sarmad Ullah Khan
Inam Bari
Detection of Food Safety Topics Based on SPLDAs
551(5)
Jinshuo Liu
Yabo Li
Yingyue Peng
Juan Deng
Xin Chen
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps
556(7)
Parvez Faruki
Vijay Kumar
Ammar B.
M.S. Gaur
Vijay Laxmi
Mauro Conti
Web Security
JumpBox -- A Seamless Browser Proxy for Tor Pluggable Transports
563(19)
Jeroen Massar
Ian Mason
Linda Briesemeister
Vinod Yegneswaran
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks
582(20)
Yinzhi Cao
Chao Yang
Vaibhav Rastogi
Yan Chen
Guofei Gu
Characterizing Google Hacking: A First Large-Scale Quantitative Study
602(21)
Jialong Zhang
Jayant Notani
Guofei Gu
Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models
623(10)
Sami Zhioua
Adnene Ben Jabeur
Mahjoub Langar
Wael Ilahi
Author Index 633