LEADER 06881nam 22006735 450 001 996466200103316 005 20200701083725.0 010 $a3-030-36938-2 024 7 $a10.1007/978-3-030-36938-5 035 $a(CKB)4100000010013763 035 $a(MiAaPQ)EBC5992496 035 $a(DE-He213)978-3-030-36938-5 035 $a(PPN)242818536 035 $a(EXLCZ)994100000010013763 100 $a20191207d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and System Security$b[electronic resource] $e13th International Conference, NSS 2019, Sapporo, Japan, December 15?18, 2019, Proceedings /$fedited by Joseph K. Liu, Xinyi Huang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (xiii, 731 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v11928 311 $a3-030-36937-4 327 $aInvited Papers -- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks -- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation -- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey -- A Graph Database-based Approach to Analyze Network Log Files -- Full Papers -- A Privacy-Enhancing Framework for Internet of Things Services -- Using Audio Characteristics for Mobile Device Authentication -- Ethereum Analysis via Node Clustering -- Strong Known Related-Key Attacks and the Security of ECDSA -- Threat Assessment of Enterprise Applications via Graphical Modelling -- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing -- Towards Secure Open Banking Architecture: An Evaluation with OWASP -- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms -- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters -- LaT-Voting: Traceable Anonymous E-Voting on Blockchain -- Distributed Secure Storage System Based on Blockchain and TPA -- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique -- A Practical Dynamic Enhanced BFT protocol -- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals -- Detecting Intruders by User File Access Patterns -- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture -- Privacy Preserving Machine Learning with Limited Information Leakage -- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained -- Sequential Aggregate MACs with Detecting Functionality Revisited -- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System -- EEG-based Authentication with Variational Universal Background Model -- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts -- A Comparative Study on Network Traffic Clustering -- Tell Them From Me: an Encrypted Application Profiler -- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP -- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies -- Difficulty of decentralized structure due to rational user behavior on Blockchain -- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis of Raindrop and FBC -- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption -- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost -- Lattice based verifiably encrypted double authentication preventing Signatures -- Privacy-Preserving Sequential Data Publishing -- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter -- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks -- SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform -- Short Papers -- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol -- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices -- Privacy-preserving k-means clustering: an application to driving style Recognition -- Derandomized PACE with Mutual Authentication -- A Muti-attributes-based Trust Model of Internet of Vehicle -- Using Sparse Composite Document Vectors to Classify VBA Macros -- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications. 330 $aThis book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. 410 0$aSecurity and Cryptology ;$v11928 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer organization 606 $aArtificial intelligence 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer organization. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aArtificial Intelligence. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aLiu$b Joseph K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuang$b Xinyi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466200103316 996 $aNetwork and system security$92088039 997 $aUNISA