[PET] NSS 2011 Call for Participation - Early Bird Registration: August 3, 2011

Giovanni Livraga giovanni.livraga at unimi.it
Sat Jul 30 23:05:28 BST 2011

[Apologies if you receive multiple copies of this message]


Universita` degli Studi di Milano, via Festa del Perdono, Milan, Italy
September 6-8, 2011

**Registration now open (early bird registration: August 3, 2011)**


NSS is an annual international conference covering research in network and
system security. The 5th International Conference on Network and System
Security (NSS 2011) will be held in Milan, Italy. Previous editions were
held in: Melbourne, Australia, (2010); Gold Coast, Australia, (2009);
Shanghai, China (2008); and Dalian, China (2007).

The NSS 2011 conference is organized as a 3-day event featuring:
- two keynote speakers
- NSS technical program (28 full papers, 29 short papers)
- co-located events:
* International Conference on Data and Knowledge Engineering (ICDKE)
* 3rd International Workshop on Cyberspace Safety and Security (CSS 2011)
* 1st International Workshop on Securing Services on the Cloud (IWSSC 2011)
* 1st Workshop on Mobile and Online Social Networks (MOSN 2011)
* 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011)


Registration information is available at:

Early registration fees apply until August 3, 2011.


- Prof. Javier Lopez
University of Malaga, Spain

- Prof. Ernesto Damiani
Università degli Studi di Milano, Italy

(in alphabetical order of title)


- A Distributed Client-Puzzle Mechanism to Mitigate Bandwidth Attacks
(Mazdak Alimadadi and Mehran S. Fallah)

- A Grid-Based Clustering for Low-Overhead Anomaly Intrusion Detection
(Zhong Yang, Yamaki Hirohumi, and Takakura Hiroki)

- A Holistic Methodology for Evaluating Wireless Intrusion Detection Systems
(Khalid Nasr, Anas Abou El Kalam, and Christian Fraboul)

- A Misuse-Based Network Intrusion Detection System Using Temporal Logic 
and Stream Processing
(Abdulbasit Ahmed, Alexei Lisitsa, and Clare Dixon)

- A Novel Semi-Supervised Approach for Network Traffic Clustering
(Yu Wang, Yang Xiang, Jun Zhang, and Shun-Zheng Yu)

- A Secure, Constraint-Aware Role-Based Access Control Interoperation 
(Nathalie Baracaldo, Amirreza Masoumzadeh, and James Joshi)

- Attack-resilient Compliance Monitoring for Large Distributed 
Infrastructure Systems
(Mirko Montanari and Roy Campbell)

- Automated Signatures Extraction of Polymorphic Viruses using Abstract 
(Renaud Tabary, Serge Chaumette, and Olivier Ly)

- CloudSec: A Security Monitoring Appliance for Virtual Machines in the 
IaaS Cloud Model
(Amani Ibrahim, James Hamlyn-Harris, John Grundy, and Mohamed Almorsy)

- DANAK: Finding the Odd!
(Cynthia Wagner, Jérôme François, Radu State, and Thomas Engel)

- Defeating Pharming Attacks at the Client-Side
(Sophie Gastellier-Prevost and Maryline Laurent)

- Designing Secure RFID Authentication Protocols is (Still) a 
Non-Trivial Task
(Panagiotis Rizomiliotis, Evangelos Rekleitis, and Stefanos Gritzalis)

- Detecting Infection Onset With Behavior-Based Policies
(Kui Xu, Danfeng Yao, Qiang Ma, and Alexander Crowell)

- Exploring Twisted Paths: Analyzing Authorization Processes in 
(Steffen Bartsch)

- FORTUNA - A Probabilistic Framework for Early Design Stages of 
Hardware-Based Secure Systems
(Roberto Gallo, Ricardo Dahab, and Henrique Kawakami)

- Improving P2P IPTV Random Peers Search Through User Similarity
(Alessio Bonti and Wen Shi)

- KL-F: Karhunen-Loève Based fragile watermarking
(Marco Botta, Davide Cavagnino, and Victor Pomponiu)

- Make Mine a Quadruple: Strengthening the Security of Graphical 
One-Time PIN authentication
(Ravi Jhawar, Philip Inglesant, Martina Angela Sasse, and Nicolas Courtois)

- Model-based Safety Analysis of SELinux Security Policies
(Peter Amthor and Winfried Kühnhauser)

- Modeling Worms Propagation on Probability
(Yini Wang, Sheng Wen, and Yang Xiang)

- Privacy-enhanced Identity via Browser Extensions and Linking Services
(Renato Accornero, Daniele Rispoli, and Francesco Bergadano)

- Reactive Non-Interference for a Browser Model
(Nataliia Bielova, Dominique Devriese, Fabio Massacci, and Frank Piessens)

- Removing the Blinders: Using Information to Mitigate Adversaries in 
Adaptive Overlays
(David Zage, Charles Killian, and Cristina Nita-Rotaru)

- Scalable Consistency-based Hardware Trojan Detection and Diagnosis
(Sheng Wei and Miodrag Potkonjak)

- Towards Ground Truthing Observations in Gray-Box Anomaly Detection
(Jiang Ming, Haibin Zhang, and Debin Gao)

- Towards Safe and Optimal Filtering Rule Reordering for Complex Packet 
(Nizar Ben Neji and Adel Bouhoula)

- Tracking End-Users in Web Databases
(Boris Rozenberg, Ehud Gudes, Yaron Gonen, Erez Shmueli, and Nurit Gal-Oz)

- Truly–protect: A VM–based Software Protection
(Amir Averbuch, Michael Kiperberg, and Nezer Jacob Zaidenberg)


- A Microcontroller SRAM-PUF
(Christoph Boehm, Maximilian Hofer, and Wolfgang Pribyl)

- A Privacy-Preserving eID based Single Sign-On Solution
(Arne Tauber, Thomas Zefferer, and Bernd Zwattendorfer)

- A Propagation Model of A Vulnerability Mitigation Computer Worm - Seawave
(Ziyad Al-Salloum and Stephen Wolthusen)

- A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc 
(Tony Cheneau, Andrei Sambra, and Maryline Laurent)

- Analysis of Prefix Hijacking Based on AS Hierarchical Model
(Bo-Feng Zhang, Yuan Li, Yu-Jing Liu, and Jin-Shu Su)

- Automatic Security Verification for 3-Party Authentication and Key 
Exchange Protocols
(Haruki Ota, Shinsaku Kiyomoto, and Yutaka Miyake)

- Avoiding DDoS with Active Management of Backlog Queues
(Martine Bellaiche, and Jean-Charles Grégoire)

- Channel State Information based Key Generation vs. Side-Channel 
Analysis Key Information Leakage
(Huiyun Li, Qi Zhang, and Hai Yuan)

- Data Control in Social Networks
(Robert Koch, Dominik Holzapfel, and Gabi Dreo Rodosek)

- Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic 
(Bassem Bakhache, Joseph Ghazal, and Safwan El-Assad)

- Evaluating Usability and Security in Authentication Mechanisms – A 
Conceptual Framework
(Martin Mihajlov, Borka Jerman-Blazic, and Saso Josimovski)

- Flooding Attacks Against Network Coding and Countermeasures
(Yuan Yuan Zhang, Wassim Znaidi, Cédric Lauradoux, and Marine Minier)

- Measuring the Revised Guessability of Graphical Passwords
(Rosanne English and Ron Poet)

- Modelling Self-protected Networks and Dynamic Systems
(Marta Fernández-Diego and Julián Marcelo-Cocho)

- On the Security of the ECKE-1N and EECKE-1N Elliptic-Curve Key 
Agreement Protocols
(Maurizio Adriano Strangio)

- R5N : Randomized Recursive Routing for Restricted-Route Networks
(Nathan Evans and Christian Grothoff)

- RCHB: A Light-weight, Provably-secure Variant of the HB Protocol Using 
Rotation and Complementation
(Samia Ali)

- Reconstructing Security Types for Automated Policy Enforcement in FABLE
(Arash Afshar, and Mehran S. Fallah)

- Secure Conjunctive Keyword Searches For Unstructured Text
(Florian Kerschbaum)

- Semi-supervised Learning for Packed Executable Detection
(Xabier Ugarte-Pedrero, Igor Santos, Pablo Bringas, Mikel Gastesi, and 
José Miguel Esparza)

- SMS Linguistic Profiling Authentication on Mobile Devices
(Hataichanok Saevanee, Nathan Clarke, and Steven Furnell)

- STORK e-Privacy and Security
(Vasilis Koulolias, Athanasios Kountzeris, Alberto Crespo, Herbert 
Leitold, and Marc Stern)

- Taxonomic Analysis of Classification Schemes in Vulnerability Databases
(Anshu Tripathi and Umesh Kumar Singh)

- The Power of Credit Card Numbers and Long CVVs
(Valentim Oliveira and Tito Silva)

- Towards a Metric for Recognition-Based Graphical Password Security
(Rosanne English and Ron Poet)

- Towards Improving Security Testability of AADL Architecture Models
(Ayda Saidane and Nicolas Guelfi)

- Trustable Outsourcing of Business Processes to Cloud Computing 
(Sami Alsouri, Stefan Katzenbeisser, and Sebastian Biedermann)

- Usability of Internet Security Software: Have They Got it Right?
(Patryk Szewczyk)

- User-Representative Feature Selection for Keystroke Dynamics
(Eesa Al Soalmi, Colin Boyd, and Irfan Ahmed)


Additional information about the conference can be found at:

More information about the PET mailing list