Need of wireless technology increasing day to day due to the rapid development in information and communications technology. Threats and attacks are also growing in accordance with the increment in the usage of wirele...
详细信息
The proceedings contain 68 papers. The special focus in this conference is on Advanced Computing, Networking and Informatics. The topics include: Parallel processing concept based vehicular bridge traffic problem;anal...
ISBN:
(纸本)9783319073491
The proceedings contain 68 papers. The special focus in this conference is on Advanced Computing, Networking and Informatics. The topics include: Parallel processing concept based vehicular bridge traffic problem;analysis of GPS based vehicle trajectory data for road traffic congestion learning;fast estimation of coverage area in a pervasive computing environment;a fault tolerance approach for mobile agents;path discovery for sinks mobility in obstacle resisting WSNs;blackhole attack defending trusted on-demand routing in ad-hoc network;level wise initial energy assignment in wireless sensor network for better network lifetime;tree based group key agreement - a survey for cognitive radio mobile ad hoc networks;performance analysis of interference aware power control scheme for TDMA in wireless sensor networks;cluster based controlling of route exploring packets in ad-hoc networks;random backoff sleep protocol for energy efficient coverage in wireless sensor networks;distributed diagnosis of permanent and intermittent faults in wireless sensor networks;efficient coverage protocol for homogeneous wireless sensor networks;a novel ICI self-cancellation scheme for improving the performance of OFDM system;design issues and user experience challenges;building a robust software based router;a global routing optimization scheme based on ABC algorithm;AODV routing protocol performance in malicious environment;a probabilistic essential visual cryptographic scheme for plural secret images;the attack back mechanism;privacy preservation of time series data using discrete wavelet transforms;exploring security theory approach in BYOD environment;a framework for analysing the security of chrome extensions;perspective based variable key encryption in LSB steganography;a novel un-compressed video watermarking in wavelet domain using fuzzy inference system;cryptanalysis andsecurity enhancement of two advanced authentication protocols;an efficient RC4 based secure content sniffing for
The proceedings contain 42 papers. The special focus in this conference is on security and Privacy in Networked systems. The topics include: cryptanalysis of an efficient biometric authentication protocol for wireless...
ISBN:
(纸本)9783662449653
The proceedings contain 42 papers. The special focus in this conference is on security and Privacy in Networked systems. The topics include: cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks;security analysis of an adaptable and scalable group access control scheme for managing wireless sensor networks;a review on mobile sensor localization;peers feedback and compliance based trust computation for cloud computing;tag digit based honeypot to detect shoulder surfing attack;cheating prevention using genetic feature based key in secret sharing schemes;security enhancement in web services by detecting and correcting anomalies in XACML policies at design level;ideal and computationally perfect secret sharing schemes for generalized access structures;a mathematical analysis of elliptic curve point multiplication;framework of lightweight secure media transfer for mobile law enforcement apps;watermark detection in spatial and transform domains based on tree structured wavelet transform;category based malware detection for android;design and analysis of online Punjabi signature verification system using grid optimization;an improved EMHS algorithm for privacy preserving in association rule mining on horizontally partitioned database;secure communication using four-wing hyper-chaotic attractor;authentication of trusted platform module using processor response;a heuristic model for performing digital forensics in cloud computing environment;attack graph generation, visualization and analysis;credit card vulnerability exhibition and authentication tool;an approach to image steganography using strength of indexed based chaotic sequence and piracy control using secure disks.
Routing in mobile ad hoc network must be efficient and resource-saving. Mobility causes frequent changes in the topology, which leads to inappropriate routing. One way to reduce traffic is to divide the network into c...
详细信息
In this paper, we propose a novel approach to enforcing eXtensible Access Control Markup Language (XACML) policy specifications in distributed environments. Our approach is based on a formal language theoretic constru...
详细信息
The proceedings contain 27 papers. The topics discussed include: communication without repudiation: the unanswered question;leader election in rings with homonyms;disjoint-access parallelism does not entail scalabilit...
ISBN:
(纸本)9783319095806
The proceedings contain 27 papers. The topics discussed include: communication without repudiation: the unanswered question;leader election in rings with homonyms;disjoint-access parallelism does not entail scalability;linearizability is not always a safety property;fair linking mechanisms for resource allocation with correlated player types;iterative approximate consensus in the presence of byzantine link failures;practically self-stabilizing paxos replicated state-machine;an architecture for automatic scaling of replicated services;hardness of firewall analysis;privacy-preserving distributed collaborative filtering;a new preference based model for relevant dimension identification in contextual mobile search;intelligent multipath optimized link state routing protocol for QoS and QoE enhancement of video transmission in MANETs;and improved ant colony optimization routing protocol for wireless sensor networks.
In this work we introduce the design and implementation of DiSR, a distributed approach to topology discovery and defectmapping in nanoscale network-on-chip scenario. We first describe the conceptual elements and the ...
详细信息
ISBN:
(纸本)9781450328227
In this work we introduce the design and implementation of DiSR, a distributed approach to topology discovery and defectmapping in nanoscale network-on-chip scenario. We first describe the conceptual elements and the execution model of DiSR, showing how the open-source Nanoxim platform has been used to evaluate the proposed approach in terms of node coverage and scalability achieved when establishing a segment partitioning. Next, in order to demostrate the feasibility of the proposed strategy in the context of the limited node resources, we propose both a schematic and gatelevel hardware implementation of the required control logic and storage. Results show a relatively acceptable impact, ranging from 10 to about 20% of the 10,0000 transistors budget available for each node. Copyright 2014 ACM.
The proceedings contain 90 papers. The topics discussed include: agentless cloud-wide streaming of guest file system updates;benchmarking the performance impact of transport layer security in cloud database systems;be...
ISBN:
(纸本)9781479937660
The proceedings contain 90 papers. The topics discussed include: agentless cloud-wide streaming of guest file system updates;benchmarking the performance impact of transport layer security in cloud database systems;benchmarking eventual consistency: lessons learned from long-term experimental studies;distributed diversification of large datasets;combining declarative and imperative cloud application provisioning based on TOSCA;Taiwan UniCloud: a cloud testbed with collaborative cloud services;towards software product lines based cloud architectures;template-based memory deduplication method for inter-data center live migration of virtual machines;encrypted set intersection protocol for outsourced datasets;CloudVMI: virtual machine introspection as a cloud service;using network knowledge to improve workload performance in virtualized data centers;characterizing and evaluating different deployment approaches for cloud application;and exploring models and mechanisms for exchanging resources in a federated cloud.
The scope of services has skyrocketed to such an extent that it is necessary for the service consumers to quickly understand the quality of a service provided by different vendors through Service Review systems (SRS)....
详细信息
ISBN:
(纸本)9783642550324;9783642550317
The scope of services has skyrocketed to such an extent that it is necessary for the service consumers to quickly understand the quality of a service provided by different vendors through Service Review systems (SRS). In this paper, we consider the trustworthyness of a SRS without a trusted review management center in location-based Service-oriented Mobile Social networks (S-MSNs). Firstly, we broach some review statistic modification attacks, which are very important for service consumers to review a service. Secondly, the M-SRS network model based on Mobile Cloud Computing (MCC) is constructed, which could protect the security and reduce the communication and computation overhead. Also, data entanglement and verifiable service utilization tickets are adopted to prevent proposed attacks in existing SRS and guarantee the trustworthyness of the statistic SRS. Final results show that M-SRS could effectively resist the existing service review attacks, and it is efficient in terms of review submission and review authenticity verification for the whole system.
Community Cloud computing is a new trend on cloud computing that aims to build service infrastructures upon Wireless Community networks taking advantage of underused community physical resources. Service allocation pr...
详细信息
暂无评论