The proceedings contain 48 papers. The topics discussed include: a novel key management mechanism for dynamic hierarchical access control based on linear polynomials;publicly auditable provable data possession scheme ...
ISBN:
(纸本)9783642341342
The proceedings contain 48 papers. The topics discussed include: a novel key management mechanism for dynamic hierarchical access control based on linear polynomials;publicly auditable provable data possession scheme for outsourced data in the public cloud using polynomial interpolation;performance evaluation of the fuzzy ARTMAP for network intrusion detection;ID-based threshold signcryption and group unsigncryption;protocol for secure submissions into learning management systems;secure leader election algorithm optimized for power saving using mobile agents for intrusion detection in MANET;effective implementation of des algorithm for voice scrambling;towards constructing a trustworthy Internet: privacy-aware transfer of digital identity document in content centric internetworking;imperceptible image indexing using digital watermarking;and a new deterministic algorithm for testing primarily based on a new property of prime numbers.
The proceedings contain 49 papers. The special focus in this conference is on security in computernetworks and distributedsystems. The topics include: Collaborative approach for data integrity verification in cloud ...
ISBN:
(纸本)9783642545245
The proceedings contain 49 papers. The special focus in this conference is on security in computernetworks and distributedsystems. The topics include: Collaborative approach for data integrity verification in cloud computing;energy efficient selective opportunistic routing in wireless sensor networks;analysis of semantic attacks in online social networks;enhanced security of PHR system in cloud using prioritized level based encryption;modified SOAR protocol using multiple metrics for wireless mesh network;clustering based routing strategies for energy management in ad-hoc networks;a survey on the security of virtual machines;trust based VM consolidation in cloud data centers;a trust model for directory-based service discovery in mobile ad hoc networks;chain routing for convergecast small scale wireless sensor networks;a genetic algorithm for scheduling workflow applications in unreliable cloud environment;autonomic SLA management in cloud computing services;compressive sensing based audio scrambling using Arnold transform;cryptanalysis of two authentication scheme for DRM system;palm print recognition using fusion of 2D-gabor and 2D log-Gabor features;a new variant of algebraic attack;a graph data model for attack graph generation and analysis;computationally perfect secret sharing scheme based on error-correcting codes;warfare message communication in tactical WMN using HWMP;metadata attribute based cipher-key generation system in cloud;automatic evaluation and signature generation technique for thwarting zero-day attacks;a theoretical study on access control model in federated systems;improved detection of P2P botnets through network behavior analysis;differential execution analysis for obfuscation reduction;emergency aware, non-invasive, personalized access control framework for IMDs;index page based EDoS attacks in infrastructure cloud;combining the X.509 and the SAML federated identity management systems;analysis of electronic voting protocol using strand spa
Water is a significant resource in day-to-day life, and it usually requires technological association for comprehensive management. Smart Water Grids (SWG) typically use cyberphysical systems (CPS) to monitor several ...
详细信息
This paper describes a novel virtual platform for university teaching, which in particular allows the creation and use of complex IT infrastructures even for non-experts. Until now, complex network infrastructures in ...
详细信息
In this era, Peer-to-Peer (P2P) networks have developed as a revolutionized network for data distribution and alternate to traditional client-server network. The features of P2P networks allow a distributed group of u...
详细信息
IoT security poses a significant challenge due to the presence of extensive confidential data and vulnerable devices. Artificial intelligence (AI) is increasingly viewed as pivotal in cybersecurity, enhancing the effi...
详细信息
The objective of this paper is to explore an effective approach for detecting anomalies in cryptocurrency transactions using artificial intelligence techniques. The proposed method is compared with existing approaches...
详细信息
This paper focuses on the security aspects of the Three-level Mobility Model (TLMM) in the next-generation networks. Prior research has indicated that hierarchical architectures outperform other network topologies in ...
详细信息
Blockchain, initially developed as the underlying technology for Bitcoin, has garnered significant attention for its applications beyond cryptocurrency, particularly in complex non-monetary domains. Utilizing cryptogr...
详细信息
While mitigating link-flooding attacks on the Internet has become an essential task, little research has been done on how an attacker can further attack and abuse the mitigation solutions themselves. In this paper, we...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
While mitigating link-flooding attacks on the Internet has become an essential task, little research has been done on how an attacker can further attack and abuse the mitigation solutions themselves. In this paper, we propose a two-wave attack with collateral damage of millions (or Carom), a new link-flooding attack that poses a mitigation dilemma for multiple simultaneously attacked networks, which must either endure the flooding attack or suffer unwanted side effects in mitigating the attack. Composed of practical components, the Carom attack aims to maximize the burden on attack mitigation systems and the collateral damage to defending networks, thereby wreaking havoc on large swaths of the Internet. After modeling real-world mitigation solutions, we evaluated the attack against the mitigation solutions with real-world datasets, showing the feasibility of the attack and quantifying the amount of damage it can inflict on today's Internet. We hope that this work can motivate the improvement of existing link-flooding mitigation solutions.
暂无评论