CSS 2013 Accepted Papers

Jan-Min Chen. A Crawler Guard for Quickly Blocking Unauthorized Web Robot

Tao Peng, Qin Liu, Guojun Wang. Privacy Preserving for Location-Based Services Using Location Transformation

Ang Mi, Weiping Wang, Shigeng Zhang, Hong Song. Design of Lightweight Web Page Tamper-Resistant mechanism for Linux

Jiangxiao Zhang, Zhoujun Li, Hua Guo. Multiple-bank E-cash without Random Oracles

Chong Fu, Tao Wang, Zhao-yu Meng, Jun-xin Chen, Hong-feng Ma. A Fast Chaos-based Symmetric Image Cipher with a Novel Bit-level Permutation Strategy

Baosheng Ge, Wen Tao Zhu. Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics

Wencheng Yang, Jiankun Hu, Song Wang and Jucheng Yang. Cancelable Fingerprint Templates with Delaunay Triangle-based Local Structures

Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng. Towards a Security-Enhanced Firewall Application for OpenFlow Networks

Lin-Bo Qiao, Bo-Feng Zhang and Jin-Shu Su. Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-stage Clustering Method

Pieter Burghouwt, Marcel Spruit and Henk Sips. Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows

Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun and Samuel Dubus. Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks

Robert Koch, Mario Golling and Gabi Dreo Rodosek. Localization and Evaluation of IP-Addresses with Special Focus on IPv6

Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili. Alert Correlation Algorithms: A Survey and Taxonomy

Natsuki Kimura and Noriaki Yoshiura. Construction and Verification of Mobile Ad hoc Network Protocols

Jun Zhang, Xiao Chen, Yang Xiang and Wanlei Zhou. Zero-day Traffic Identification

Christian Callegari, Stefano Giordano, Susanna Mannella and Michele Pagano. Design and Implementation of a Testbed for the Security Assessment of MANETs

Qiang Liu, Jianping Yin, Shui Yu. A Bio-Inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology

Leyou Zhang, Qing Wu, Yi Mu. Anonymous Identity-based Broadcast Encryption with Adaptive Security

Qing Wu, Leyou Zhang. Hierarchical Identity-based Signature with short public keys

Nizar Kheir, Xiao Han. PeerViewer: Behavioral Tracking and Classification of P2P Malware

Jingping Song, Zhiliang Zhu, Peter Scully, Chris Price. Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification

Sheng Wen, Ping Li, Di Wu, Yang Xiang, Wanlei Zhou. Detecting Stepping Stones by Abnormal Causality Probability

Aihua Peng, Lansheng Han, Yanan Yu, Nan Du, MingQuan Li. Algebra-based Behavior Identifcation of Trojan Horse

Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu. Cryptanalysis and Improvement of An ECC-based Password Authentication Scheme Using Smart Cards

Haichang Gao, Wei Jia, Ning Liu, Kaisheng Li. The Hot-spots Problem in Windows 8 Graphical Password Scheme

Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang. Static Detection of Dangerous Behaviors in Android Apps

Youssou Faye, Herve Guyennet, Ibrahima Niang and Yanbo Shou. Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable For Wireless Sensor Networks

Chang-Ji Wang, Wen-Tao Li, Yuan Li and Xi-Lei Xu. A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function

Shuhong Chen, Guojun Wang, Weijia Jia. A Trust model using Implicit Call Behavioral Graph for Mobile Cloud Computing

Fangfang Zhou, Ronghua Shi, Ying Zhao, Yezi Huang. NetSecRadar: A visualization system for network security situational awareness