Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/nss/nss2012.bht:"
@inproceedings{DBLP:conf/nss/AlcarazL12, author = {Cristina Alcaraz and Javier L{\'{o}}pez}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Addressing Situational Awareness in Critical Domains of a Smart Grid}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {58--71}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_5}, doi = {10.1007/978-3-642-34601-9\_5}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/AlcarazL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BeilkeR12, author = {Kristian Beilke and Volker Roth}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {FlexCOS: An Open Smartcard Platform for Research and Education}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {277--290}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_21}, doi = {10.1007/978-3-642-34601-9\_21}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/BeilkeR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/GuoW12, author = {Jing Guo and Zhuxiao Wang}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {405--416}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_31}, doi = {10.1007/978-3-642-34601-9\_31}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/GuoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HanZ0LQ12, author = {Qi Han and Yinghui Zhang and Xiaofeng Chen and Hui Li and Jiaxiang Quan}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {180--191}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_14}, doi = {10.1007/978-3-642-34601-9\_14}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/HanZ0LQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/IbrahimGHA12, author = {Amani S. Ibrahim and John Grundy and James H. Hamlyn{-}Harris and Mohamed Almorsy}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Operating System Kernel Data Disambiguation to Support Security Analysis}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {263--276}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_20}, doi = {10.1007/978-3-642-34601-9\_20}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/IbrahimGHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/IbrahimHGA12, author = {Amani S. Ibrahim and James H. Hamlyn{-}Harris and John Grundy and Mohamed Almorsy}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Identifying {OS} Kernel Objects for Run-Time Security Analysis}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {72--85}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_6}, doi = {10.1007/978-3-642-34601-9\_6}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/IbrahimHGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KarumanchiSL12, author = {Sushama Karumanchi and Anna Cinzia Squicciarini and Dan Lin}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {445--461}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_34}, doi = {10.1007/978-3-642-34601-9\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/KarumanchiSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KrzywieckiK12, author = {Lukasz Krzywiecki and Miroslaw Kutylowski}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {305--319}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_23}, doi = {10.1007/978-3-642-34601-9\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KrzywieckiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LeeC12, author = {Tae{-}Gyu Lee and Gi{-}Soo Chung}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {A Scalable Link Model for Local Optical Wireless Networks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {44--57}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_4}, doi = {10.1007/978-3-642-34601-9\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LeeC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LeeC12a, author = {Tae{-}Gyu Lee and Gi{-}Soo Chung}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Background Transfer Method for Ubiquitous Computing}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {86--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_7}, doi = {10.1007/978-3-642-34601-9\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LeeC12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiHF12, author = {Long{-}Hai Li and Cheng{-}Qiang Huang and Shao{-}Feng Fu}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {220--232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_17}, doi = {10.1007/978-3-642-34601-9\_17}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LiHF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiLCJL12, author = {Jingwei Li and Jin Li and Xiaofeng Chen and Chunfu Jia and Zheli Liu}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {490--502}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_37}, doi = {10.1007/978-3-642-34601-9\_37}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/LiLCJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiuZC12, author = {Shengli Liu and Fangguo Zhang and Kefei Chen}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Selective Opening Chosen Ciphertext Security Directly from the {DDH} Assumption}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {100--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_8}, doi = {10.1007/978-3-642-34601-9\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/LiuZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MahdavifarAKM12, author = {Samaneh Mahdavifar and Mahdi Abadi and Mohsen Kahani and Hassan Mahdikhani}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {149--165}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_12}, doi = {10.1007/978-3-642-34601-9\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/MahdavifarAKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MamunMR12, author = {Mohammad Saiful Islam Mamun and Atsuko Miyaji and Mohammad Shahriar Rahman}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {A Secure and Private {RFID} Authentication Protocol under {SLPN} Problem}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {476--489}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_36}, doi = {10.1007/978-3-642-34601-9\_36}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MamunMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MenahemPE12, author = {Eitan Menahem and Rami Puzis and Yuval Elovici}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Detecting Spammers via Aggregated Historical Data Set}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {248--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_19}, doi = {10.1007/978-3-642-34601-9\_19}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MenahemPE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MengK12, author = {Yuxin Meng and Lam{-}for Kwok}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Enhancing List-Based Packet Filter Using {IP} Verification Mechanism against {IP} Spoofing Attack in Network Intrusion Detection}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {1--14}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_1}, doi = {10.1007/978-3-642-34601-9\_1}, timestamp = {Fri, 12 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/MengK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MousaviT12, author = {Nima Mousavi and Mahesh V. Tripunitara}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control {(RBAC)}}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {516--529}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_39}, doi = {10.1007/978-3-642-34601-9\_39}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MousaviT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/RaniseA12, author = {Silvio Ranise and Alessandro Armando}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {On the Automated Analysis of Safety in Usage Control: {A} New Decidability Result}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {15--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_2}, doi = {10.1007/978-3-642-34601-9\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/RaniseA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SchlegelW12, author = {Roman Schlegel and Duncan S. Wong}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Private Friends on a Social Networking Site Operated by an Overly Curious {SNP}}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {430--444}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_33}, doi = {10.1007/978-3-642-34601-9\_33}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/SchlegelW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ShuaiZ12, author = {Huimin Shuai and Wen Tao Zhu}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {503--515}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_38}, doi = {10.1007/978-3-642-34601-9\_38}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ShuaiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SusiloCW12, author = {Willy Susilo and Yang{-}Wai Chow and Rungrat Wiangsripanawan}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {291--304}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_22}, doi = {10.1007/978-3-642-34601-9\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/SusiloCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TangLK12, author = {Fei Tang and Changlu Lin and Pinhui Ke}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Universal Designated Verifier Signcryption}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {126--134}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_10}, doi = {10.1007/978-3-642-34601-9\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/TangLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TangX12, author = {Shaohua Tang and Lingling Xu}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Proxy Signature Scheme Based on Isomorphisms of Polynomials}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {113--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_9}, doi = {10.1007/978-3-642-34601-9\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/TangX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TimpanaroCF12, author = {Juan Pablo Timpanaro and Isabelle Chrisment and Olivier Festor}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {A Bird's Eye View on the {I2P} Anonymous File-Sharing Environment}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {135--148}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_11}, doi = {10.1007/978-3-642-34601-9\_11}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/TimpanaroCF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WagnerWS12, author = {Steffen Wagner and Sascha Wessel and Frederic Stumpf}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Attestation of Mobile Baseband Stacks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {29--43}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_3}, doi = {10.1007/978-3-642-34601-9\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WagnerWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WahidLZ12, author = {Alif Wahid and Christopher Leckie and Chenfeng Vincent Zhou}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {166--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_13}, doi = {10.1007/978-3-642-34601-9\_13}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WahidLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangMGC12, author = {Ding Wang and Chunguang Ma and De{-}li Gu and Zhen{-}shan Cui}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {462--475}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_35}, doi = {10.1007/978-3-642-34601-9\_35}, timestamp = {Sat, 24 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/WangMGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WeiYLD12, author = {Yuechuan Wei and Xiaoyuan Yang and Chao Li and Weidong Du}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Impossible Differential Cryptanalysis on Tweaked {E2}}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {392--404}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_30}, doi = {10.1007/978-3-642-34601-9\_30}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WeiYLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WuTS12, author = {Mu{-}En Wu and Raylin Tso and Hung{-}Min Sun}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Cryptanalysis of Exhaustive Search on Attacking {RSA}}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {373--379}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_28}, doi = {10.1007/978-3-642-34601-9\_28}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WuTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WuTS12a, author = {Mu{-}En Wu and Raylin Tso and Hung{-}Min Sun}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {On the Improvement of Fermat Factorization}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {380--391}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_29}, doi = {10.1007/978-3-642-34601-9\_29}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WuTS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Xiong12, author = {Kaiqi Xiong}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {The Performance of Public Key-Based Authentication Protocols}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {206--219}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_16}, doi = {10.1007/978-3-642-34601-9\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Xiong12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Yang12, author = {Yang Yang}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {A Communication Efficient Group Key Distribution Scheme for MANETs}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {361--372}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_27}, doi = {10.1007/978-3-642-34601-9\_27}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Yang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YangZS12, author = {Wenjie Yang and Futai Zhang and Limin Shen}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Practical Certificateless Public Key Encryption in the Standard Model}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {320--333}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_24}, doi = {10.1007/978-3-642-34601-9\_24}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/YangZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YuFPSF12, author = {Yue Yu and Michael Fry and Bernhard Plattner and Paul Smith and Alberto E. Schaeffer Filho}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Resilience Strategies for Networked Malware Detection and Remediation}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {233--247}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_18}, doi = {10.1007/978-3-642-34601-9\_18}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/YuFPSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangAYS12, author = {Yunmei Zhang and Man Ho Au and Guomin Yang and Willy Susilo}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {334--347}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_25}, doi = {10.1007/978-3-642-34601-9\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangAYS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangWH12, author = {Leyou Zhang and Qing Wu and Yupu Hu}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Direct {CCA} Secure Identity-Based Broadcast Encryption}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {348--360}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_26}, doi = {10.1007/978-3-642-34601-9\_26}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ZhangWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangWW12, author = {Xilin Zhang and Yingjie Wu and Xiaodong Wang}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Differential Privacy Data Release through Adding Noise on Average Value}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {417--429}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_32}, doi = {10.1007/978-3-642-34601-9\_32}, timestamp = {Thu, 12 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhaoLDD12, author = {Yifan Zhao and Swee{-}Won Lo and Robert H. Deng and Xuhua Ding}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {An Improved Authentication Scheme for {H.264/SVC} and Its Performance Evaluation over Non-stationary Wireless Mobile Networks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {192--205}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_15}, doi = {10.1007/978-3-642-34601-9\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhaoLDD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2012, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9}, doi = {10.1007/978-3-642-34601-9}, isbn = {978-3-642-34600-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.