Search dblp for Publications

export results for "toc:db/conf/nss/nss2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/nss/AlcarazL12,
  author       = {Cristina Alcaraz and
                  Javier L{\'{o}}pez},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Addressing Situational Awareness in Critical Domains of a Smart Grid},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {58--71},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_5},
  doi          = {10.1007/978-3-642-34601-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/AlcarazL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BeilkeR12,
  author       = {Kristian Beilke and
                  Volker Roth},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {FlexCOS: An Open Smartcard Platform for Research and Education},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {277--290},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_21},
  doi          = {10.1007/978-3-642-34601-9\_21},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/BeilkeR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/GuoW12,
  author       = {Jing Guo and
                  Zhuxiao Wang},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems
                  with Channel Errors},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {405--416},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_31},
  doi          = {10.1007/978-3-642-34601-9\_31},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/GuoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HanZ0LQ12,
  author       = {Qi Han and
                  Yinghui Zhang and
                  Xiaofeng Chen and
                  Hui Li and
                  Jiaxiang Quan},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Efficient and Robust Identity-Based Handoff Authentication in Wireless
                  Networks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_14},
  doi          = {10.1007/978-3-642-34601-9\_14},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/HanZ0LQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/IbrahimGHA12,
  author       = {Amani S. Ibrahim and
                  John Grundy and
                  James H. Hamlyn{-}Harris and
                  Mohamed Almorsy},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Operating System Kernel Data Disambiguation to Support Security Analysis},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_20},
  doi          = {10.1007/978-3-642-34601-9\_20},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/IbrahimGHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/IbrahimHGA12,
  author       = {Amani S. Ibrahim and
                  James H. Hamlyn{-}Harris and
                  John Grundy and
                  Mohamed Almorsy},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Identifying {OS} Kernel Objects for Run-Time Security Analysis},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {72--85},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_6},
  doi          = {10.1007/978-3-642-34601-9\_6},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/IbrahimHGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KarumanchiSL12,
  author       = {Sushama Karumanchi and
                  Anna Cinzia Squicciarini and
                  Dan Lin},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {445--461},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_34},
  doi          = {10.1007/978-3-642-34601-9\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/KarumanchiSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KrzywieckiK12,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Proof of Possession for Cloud Storage via Lagrangian Interpolation
                  Techniques},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_23},
  doi          = {10.1007/978-3-642-34601-9\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KrzywieckiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LeeC12,
  author       = {Tae{-}Gyu Lee and
                  Gi{-}Soo Chung},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {A Scalable Link Model for Local Optical Wireless Networks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {44--57},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_4},
  doi          = {10.1007/978-3-642-34601-9\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LeeC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LeeC12a,
  author       = {Tae{-}Gyu Lee and
                  Gi{-}Soo Chung},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Background Transfer Method for Ubiquitous Computing},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_7},
  doi          = {10.1007/978-3-642-34601-9\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LeeC12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiHF12,
  author       = {Long{-}Hai Li and
                  Cheng{-}Qiang Huang and
                  Shao{-}Feng Fu},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Boardroom Voting Scheme with Unconditionally Secret Ballots Based
                  on DC-Net},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {220--232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_17},
  doi          = {10.1007/978-3-642-34601-9\_17},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LiHF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiLCJL12,
  author       = {Jingwei Li and
                  Jin Li and
                  Xiaofeng Chen and
                  Chunfu Jia and
                  Zheli Liu},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Efficient Keyword Search over Encrypted Data with Fine-Grained Access
                  Control in Hybrid Cloud},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {490--502},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_37},
  doi          = {10.1007/978-3-642-34601-9\_37},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/LiLCJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiuZC12,
  author       = {Shengli Liu and
                  Fangguo Zhang and
                  Kefei Chen},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Selective Opening Chosen Ciphertext Security Directly from the {DDH}
                  Assumption},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_8},
  doi          = {10.1007/978-3-642-34601-9\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/LiuZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MahdavifarAKM12,
  author       = {Samaneh Mahdavifar and
                  Mahdi Abadi and
                  Mohsen Kahani and
                  Hassan Mahdikhani},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {A Clustering-Based Approach for Personalized Privacy Preserving Publication
                  of Moving Object Trajectory Data},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_12},
  doi          = {10.1007/978-3-642-34601-9\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/MahdavifarAKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MamunMR12,
  author       = {Mohammad Saiful Islam Mamun and
                  Atsuko Miyaji and
                  Mohammad Shahriar Rahman},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {A Secure and Private {RFID} Authentication Protocol under {SLPN} Problem},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {476--489},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_36},
  doi          = {10.1007/978-3-642-34601-9\_36},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MamunMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MenahemPE12,
  author       = {Eitan Menahem and
                  Rami Puzis and
                  Yuval Elovici},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Detecting Spammers via Aggregated Historical Data Set},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_19},
  doi          = {10.1007/978-3-642-34601-9\_19},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MenahemPE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MengK12,
  author       = {Yuxin Meng and
                  Lam{-}for Kwok},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Enhancing List-Based Packet Filter Using {IP} Verification Mechanism
                  against {IP} Spoofing Attack in Network Intrusion Detection},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_1},
  doi          = {10.1007/978-3-642-34601-9\_1},
  timestamp    = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/MengK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MousaviT12,
  author       = {Nima Mousavi and
                  Mahesh V. Tripunitara},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Mitigating the Intractability of the User Authorization Query Problem
                  in Role-Based Access Control {(RBAC)}},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {516--529},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_39},
  doi          = {10.1007/978-3-642-34601-9\_39},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MousaviT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RaniseA12,
  author       = {Silvio Ranise and
                  Alessandro Armando},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {On the Automated Analysis of Safety in Usage Control: {A} New Decidability
                  Result},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {15--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_2},
  doi          = {10.1007/978-3-642-34601-9\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/RaniseA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SchlegelW12,
  author       = {Roman Schlegel and
                  Duncan S. Wong},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Private Friends on a Social Networking Site Operated by an Overly
                  Curious {SNP}},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {430--444},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_33},
  doi          = {10.1007/978-3-642-34601-9\_33},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/SchlegelW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ShuaiZ12,
  author       = {Huimin Shuai and
                  Wen Tao Zhu},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Masque: Access Control for Interactive Sharing of Encrypted Data in
                  Social Networks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {503--515},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_38},
  doi          = {10.1007/978-3-642-34601-9\_38},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ShuaiZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SusiloCW12,
  author       = {Willy Susilo and
                  Yang{-}Wai Chow and
                  Rungrat Wiangsripanawan},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Towards Formalizing a Reputation System for Cheating Detection in
                  Peer-to-Peer-Based Massively Multiplayer Online Games},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {291--304},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_22},
  doi          = {10.1007/978-3-642-34601-9\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/SusiloCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TangLK12,
  author       = {Fei Tang and
                  Changlu Lin and
                  Pinhui Ke},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Universal Designated Verifier Signcryption},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {126--134},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_10},
  doi          = {10.1007/978-3-642-34601-9\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TangLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TangX12,
  author       = {Shaohua Tang and
                  Lingling Xu},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Proxy Signature Scheme Based on Isomorphisms of Polynomials},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {113--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_9},
  doi          = {10.1007/978-3-642-34601-9\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TangX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TimpanaroCF12,
  author       = {Juan Pablo Timpanaro and
                  Isabelle Chrisment and
                  Olivier Festor},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {A Bird's Eye View on the {I2P} Anonymous File-Sharing Environment},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_11},
  doi          = {10.1007/978-3-642-34601-9\_11},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TimpanaroCF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WagnerWS12,
  author       = {Steffen Wagner and
                  Sascha Wessel and
                  Frederic Stumpf},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Attestation of Mobile Baseband Stacks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {29--43},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_3},
  doi          = {10.1007/978-3-642-34601-9\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WagnerWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WahidLZ12,
  author       = {Alif Wahid and
                  Christopher Leckie and
                  Chenfeng Vincent Zhou},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Estimating the Number of Hosts Corresponding to an Address while Preserving
                  Anonymity},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_13},
  doi          = {10.1007/978-3-642-34601-9\_13},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WahidLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WangMGC12,
  author       = {Ding Wang and
                  Chunguang Ma and
                  De{-}li Gu and
                  Zhen{-}shan Cui},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes
                  for Multi-server Architecture},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {462--475},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_35},
  doi          = {10.1007/978-3-642-34601-9\_35},
  timestamp    = {Sat, 24 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/WangMGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WeiYLD12,
  author       = {Yuechuan Wei and
                  Xiaoyuan Yang and
                  Chao Li and
                  Weidong Du},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Impossible Differential Cryptanalysis on Tweaked {E2}},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {392--404},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_30},
  doi          = {10.1007/978-3-642-34601-9\_30},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WeiYLD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WuTS12,
  author       = {Mu{-}En Wu and
                  Raylin Tso and
                  Hung{-}Min Sun},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Cryptanalysis of Exhaustive Search on Attacking {RSA}},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {373--379},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_28},
  doi          = {10.1007/978-3-642-34601-9\_28},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WuTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WuTS12a,
  author       = {Mu{-}En Wu and
                  Raylin Tso and
                  Hung{-}Min Sun},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {On the Improvement of Fermat Factorization},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {380--391},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_29},
  doi          = {10.1007/978-3-642-34601-9\_29},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WuTS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Xiong12,
  author       = {Kaiqi Xiong},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {The Performance of Public Key-Based Authentication Protocols},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {206--219},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_16},
  doi          = {10.1007/978-3-642-34601-9\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Xiong12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Yang12,
  author       = {Yang Yang},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {A Communication Efficient Group Key Distribution Scheme for MANETs},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {361--372},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_27},
  doi          = {10.1007/978-3-642-34601-9\_27},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Yang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YangZS12,
  author       = {Wenjie Yang and
                  Futai Zhang and
                  Limin Shen},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Practical Certificateless Public Key Encryption in the Standard Model},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {320--333},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_24},
  doi          = {10.1007/978-3-642-34601-9\_24},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/YangZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YuFPSF12,
  author       = {Yue Yu and
                  Michael Fry and
                  Bernhard Plattner and
                  Paul Smith and
                  Alberto E. Schaeffer Filho},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Resilience Strategies for Networked Malware Detection and Remediation},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_18},
  doi          = {10.1007/978-3-642-34601-9\_18},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/YuFPSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangAYS12,
  author       = {Yunmei Zhang and
                  Man Ho Au and
                  Guomin Yang and
                  Willy Susilo},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {(Strong) Multi-Designated Verifiers Signatures Secure against Rogue
                  Key Attack},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {334--347},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_25},
  doi          = {10.1007/978-3-642-34601-9\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangAYS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangWH12,
  author       = {Leyou Zhang and
                  Qing Wu and
                  Yupu Hu},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Direct {CCA} Secure Identity-Based Broadcast Encryption},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {348--360},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_26},
  doi          = {10.1007/978-3-642-34601-9\_26},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangWW12,
  author       = {Xilin Zhang and
                  Yingjie Wu and
                  Xiaodong Wang},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Differential Privacy Data Release through Adding Noise on Average
                  Value},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {417--429},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_32},
  doi          = {10.1007/978-3-642-34601-9\_32},
  timestamp    = {Thu, 12 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhaoLDD12,
  author       = {Yifan Zhao and
                  Swee{-}Won Lo and
                  Robert H. Deng and
                  Xuhua Ding},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {An Improved Authentication Scheme for {H.264/SVC} and Its Performance
                  Evaluation over Non-stationary Wireless Mobile Networks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_15},
  doi          = {10.1007/978-3-642-34601-9\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhaoLDD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2012,
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9},
  doi          = {10.1007/978-3-642-34601-9},
  isbn         = {978-3-642-34600-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics