000 05230nam a22003615i 4500
001 318304
003 MX-SnUAN
005 20160429161125.0
007 cr nn 008mamaa
008 160111s2014 gw | s |||| 0|eng d
020 _a9783319116983
_9978-3-319-11698-3
035 _avtls000418907
039 9 _y201601110908
_zstaff
050 4 _aQA76.9.A25
245 1 0 _aNetwork and system security :
_b8th international conference, nss 2014, xi’an, china, october 15-17, 2014, proceedings /
_cedited by Man Ho Au, Barbara Carminati, C.-C. Jay Kuo.
264 1 _aCham :
_bSpringer International Publishing :
_bSpringer,
_c2014.
300 _axviii, 576 páginas :
_b117 ilustraciones
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8792
500 _aSpringer eBooks
505 0 _aCloud Computing -- An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures -- Adopting Provenance-Based Access Control in OpenStack Cloud IaaS -- Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage -- A Formal Model for Isolation Management in Cloud Infrastructure-asa- Service -- Access Control -- Extending OpenStack Access Control with Domain Trust -- Hierarchical Solution for Access Control and Authentication in Software Defined Networks -- A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing -- Network Security.-psOBJ: Defending against Traffic Analysis with pseudo-Objects -- Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS -- Revisiting Node Injection of P2P Botnet -- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification -- Security Analysis -- Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack -- A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique -- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock -- Cryptanalysis on the Authenticated Cipher Sablier -- A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique -- Security Analysis and Improvement of Femtocell Access Control -- Public Key Cryptography -- Identity Based Threshold Ring Signature from Lattices -- Identity-Based Transitive Signcryptio -- GO-ABE: Group-Oriented Attribute-Based Encryption -- Jhanwar-Barua’s Identity-Based Encryption Revisited -- Lightweight Universally Composable Adaptive Oblivious Transfer -- Certificate-Based Conditional Proxy Re-Encryption -- A Secure Obfuscator for Encrypted Blind Signature Functionality -- Attribute-Based Signing Right Delegation -- System Security -- Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios -- iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications -- Formal Verification of Finite State Transactional Security Policy -- Privacy-Preserving Systems and Bio-metrics -- Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features -- Privacy Preserving Biometrics-Based and User Centric Authentication Protocol -- A Dynamic Matching Secret Handshake Scheme without Random Oracles -- Formal Analysis of DAA-Related APIs in TPM 2.0 -- Key Management and Distribution -- eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy -- Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks -- A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks -- Short Papers -- Rational Secure Two-party Computation in Social Cloud -- How to Evaluate Trust Using MMT -- A Proposed Approach to Compound File Fragment Identification -- Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework -- A New Approach to Executable File Fragment Detection in Network Forensics -- Tighter Security Bound of MIBS Block Cipher against Differential Attack -- A New Multivariate Based Threshold Ring Signature Scheme -- Capturing Android Malware Behaviour Using System Flow Graph -- Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD -- A New Public Key Encryption with Equality Test -- A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers -- Multi-domain Direct Anonymous Attestation Scheme from Pairings.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aAu, Man Ho,
_eeditor.
_9362168
700 1 _aCarminati, Barbara,
_eeditor.
_9362169
700 1 _aKuo, C.-C. Jay,
_eeditor.
_9304461
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783319116976
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-11698-3
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c318304
_d318304