Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource)
Resource Information
The instance Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries. This resource is a combination of several types including: Instance, Electronic.
The Resource
Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource)
Resource Information
The instance Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries. This resource is a combination of several types including: Instance, Electronic.
- Label
- Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource)
- Title remainder
- 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings
- Medium
- electronic resource
- Statement of responsibility
- edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix
- Dimensions
- unknown
- Edition
- 1st ed. 2016.
- Extent
- XIV, 540 p. 128 illus.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783319462981
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-319-46298-1
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Record ID
- 99208388910801161
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-319-46298-1
Context
Context of Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource)Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/0E2o-hLC0PM/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/0E2o-hLC0PM/">Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/0E2o-hLC0PM/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/0E2o-hLC0PM/">Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>