Network and System Security: 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings

Author:   Man Ho Au ,  Siu Ming Yiu ,  Jin Li ,  Xiapu Luo
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2018
Volume:   11058
ISBN:  

9783030027438


Pages:   492
Publication Date:   19 December 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $263.97 Quantity:  
Add to Cart

Share |

Network and System Security: 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Man Ho Au ,  Siu Ming Yiu ,  Jin Li ,  Xiapu Luo
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2018
Volume:   11058
Weight:   0.765kg
ISBN:  

9783030027438


ISBN 10:   3030027430
Pages:   492
Publication Date:   19 December 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics.- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems.- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi.- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.- User Relationship Classication of Facebook Messenger Mobile Data using WEKA.- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.- Real-time IoT Device Activity Detection in Edge Networks.- Analysis on the Block Reward of Fork After Withholding.- DBAF: Dynamic Binary Analysis Framework and Its Applications.- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing.- Analyzing the Communication Security between Smartphones and IoT based on CORAS.- An efficient privacy preserving batch authentication scheme with deterable function for VANETs.- Using Software Visualization for Supporting the Teaching of Map Reduce.- Walking on the Cloud: Gait Recognition, a Wearable Solution.- Anonymous Attribute-Based Conditional Proxy Re-Encryption.- Burn After Reading: Expunging Execution Footprints of Android Apps.- Comprehensive Analysis of the Permissions used in Android.- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity.- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.- An OpenvSwitch Extension for SDN Traceback.- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks.- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption.- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs.- Creating and Managing Realism in the Next-Generation Cyber Range.- Deep Android Malware Detection with Adaptive Classifier Selection.- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge.- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices.- Understanding the Behaviors of BGP-based DDoS Protection Services.- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture.- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke.- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices.- Android Malware Detection Methods Based on the Combination of Clustering and Classification.- Secure Semantic Search based on Two-level Index over Encrypted Cloud.- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List