default search action
INCoS 2013: Xi'an City, Shaanxi Province, China
- 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013. IEEE 2013, ISBN 978-0-7695-4988-0
INCoS 2013-Fifth IEEE International Conference on Intelligent Networking and Collaborative Systems
Session 1: Cloud Computing: Service, Storage, and Virtualization
- Di Lu, Jianfeng Ma, Yichuan Wang, Ning Xi:
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing. 1-8 - Hui Zhu, Yingfang Xue, Yun Zhang, Xiaofeng Chen, Hui Li, Ximeng Liu:
V-MLR: A Multilevel Security Model for Virtualization. 9-16 - Hui Zhu, Siyu Chen, Lexiang Zhu, Hui Li, Xiaofeng Chen:
RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree. 17-22 - Kai Fan, Dayang Zhang, Hui Li, Yintang Yang:
An Adaptive Feedback Load Balancing Algorithm in HDFS. 23-29
Session 2: Encryption Techniques I
- Rong Cheng, Fangguo Zhang:
Secure Obfuscation of Conditional Re-encryption with Keyword Search. 30-37 - Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. 38-45 - Keying Li, Yinghui Zhang, Hua Ma:
Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure. 46-50 - Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma:
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control. 51-57
Session 3: Machine Learning and Optimization Techniques
- Walisa Romsaiyud:
Simulation of the Adaptive Multivariate Exploration for Routes Guidance. 58-63 - Jan Platos, Pavel Krömer:
Prediction of Multi-class Industrial Data. 64-68 - Liumei Zhang, Jianfeng Ma, Yichuan Wang:
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese. 69-76 - Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Makoto Ikeda, Fatos Xhafa, Leonard Barolli:
Performance Evaluation of WMN-GA for Wireless Mesh Networks Considering Mobile Mesh Clients. 77-84 - Yichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu:
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency. 85-92
Session 4: Encryption Techniques II
- Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong:
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. 93-98 - Shuaishuai Zhu, Xiaoyuan Yang, Xuguang Wu:
Secure Cloud File System with Attribute Based Encryption. 99-102 - Chang-Ji Wang, Jia-Sen Huang, Wen-Long Lin, Hai-Tao Lin:
Security Analysis of Gagne et al.'s Threshold Attribute-Based Signcryption Scheme. 103-108 - Chengyu Hu, Pengtao Liu:
Public Key Encryption with Ranked Multi-keyword Search. 109-113
Session 5: Clustering Techniques
- Thanh Van Le, Trong Nghia Truong, Hong Nam Nguyen, Tran Vu Pham:
An Efficient Pretopological Approach for Document Clustering. 114-120 - Ales Vítek, Martin Stachon, Pavel Krömer, Václav Snásel:
Towards the Modeling of Atomic and Molecular Clusters Energy by Support Vector Regression. 121-126 - Jing Wang, Hui Li, Hui Zhao:
The Contextual Group Recommendation. 127-131 - Umara Noor, Ali Daud, Ayesha Manzoor:
Latent Dirichlet Allocation Based Semantic Clustering of Heterogeneous Deep Web Sources. 132-138
Session 6: Security Techniques for Grid, Cloud, and Ubiquitous Computing Systems
- Zhen Guo, Xudong Zhu, Lijun Guo, Si Kang:
Design of a Security Framework on MapReduce. 139-145 - Jianhua Yu, Yue Luo, Xueli Wang:
Deceptive Detection and Security Reinforcement in Grid Computing. 146-152 - Zhusong Liu, Sheng Sun, Yunfa Li:
An Auditing Mechanism for the Security of Service in Grid. 153-156 - Arcangelo Castiglione, Alfredo De Santis, Aniello Castiglione, Francesco Palmieri, Ugo Fiore:
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications. 157-165
Session 7: Intelligent Computing, Data Integrity, and Privacy Techniques
- Yuanyuan Cheng, Jin Zhang, Xiaowei Liu, Qingcheng Li, Zhenlu Chen:
Research on Polymorphism in Digital Text Watermarking. 166-172 - Ximeng Liu, Tao Zhang, Jianfeng Ma, Hui Zhu, Feng Cai:
Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network. 173-180 - Yuxin Meng, Wenjuan Li, Lam-for Kwok, Yang Xiang:
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice. 181-188 - Gaoyu Zhang, Duying Huang:
Short-Term Network Traffic Prediction with ACD and Particle Filter. 189-191 - Jun Ye, Yong Ding, Xin-Guo Li:
Information Entropy Model for Anonymity Measurement. 192-195
Session 8: Intelligent Computing and Networking
- Pavel Krömer, Václav Snásel, Ivan Zelinka:
Randomness and Chaos in Genetic Algorithms and Differential Evolution. 196-201 - Ruhua Cai:
Wavelet Packet Variance Methods for Multi-period Analysis of Signal. 202-206 - Siwen Guo:
Numerical Approach for Automatic Theorem Proving in Plane Geometry. 207-209 - Xiaoqing Li, Jicheng Liu, Xuejun Li, Weiying Sun:
RGTE: A Reputation-Based Global Trust Establishment in VANETs. 210-214 - Xiaoqing Li, Weiying Sun, Xuejun Li, Jicheng Liu:
GRTR: A Geocasting Routing Based Target Region for VANET. 215-219
Session 9: Security and Authentication Techniques
- Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu:
Fully Secure Decentralized Key-Policy Attribute-Based Encryption. 220-225 - Ming Tang, Weijin Sun, Si Gao, Yuan Wu, Hongbo Peng, Zhenlong Qiu, Xin Wang:
On Design of Nonlinear Operations and Round Functions of Block Ciphers with Resistance to ASCAs. 226-232 - Chuangui Ma, Fushan Wei, Fengxiu Gao:
Efficient Client-to-Client Password Authenticated Key Exchange Based on RSA. 233-238 - Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li:
A Secure Document Self-Destruction Scheme with Identity Based Encryption. 239-243
Session 10: Intelligent Networking, Architectures, and Visualization
- Martin Radvanský, Milos Kudelka, Zdenek Horak, Václav Snásel:
Network Layout Visualization Based on Sammon's Projection. 244-249 - Sarka Zehnalova, Zdenek Horak, Milos Kudelka, Václav Snásel:
Local Dependency in Networks. 250-254 - Hang Yin, Yongming Gao, Guoqiang Zeng, Chao Wang:
Research of Space Robot Autonomous Operation Architecture. 255-260 - Zhonghuo Wu, Jun Zheng, Su Wang, Hongfeng Feng:
A Combined Predictor for Item-Based Collaborative Filtering. 261-265
Session 11: Intelligent Collaborative Systems for Work and Learning
- Philip Moore, Andrew M. Thomas, Fatos Xhafa, Leonard Barolli:
Context and the Virtual Campus: Collaboration in Tertiary Education. 266-272 - Vincenza Benigno, Nicola Capuano, Giuseppina Rita Mangione, Saverio Salerno:
A Social Semantic Repository for Special Needs Education. 273-280 - Thanasis Daradoumis, Marta Arguedas, Fatos Xhafa:
Building Intelligent Emotion Awareness for Improving Collaborative E-Learning. 281-288
Session 12: Online Collaborative Systems and Virtual Campuses
- Jorge Miguel, Santi Caballé, Josep Prieto:
Providing Information Security to MOOC: Towards Effective Student Authentication. 289-292 - Vladi Kolici, Fatos Xhafa, Leonard Barolli:
Analysis of P2P Communications in Online Collaborative Teamwork Settings. 293-299 - He Xueni:
University Network-Design Based on Cloud Computing. 300-303
Session 13: Security and Identity Schemes
- Rong Cheng, Feng Diao, Fangguo Zhang:
On Obfuscating Set-Membership Predicate Functions. 304-308 - Yilei Wang, Qiuliang Xu, Zhe Liu:
Fair Computation with Tit-for-Tat Strategy. 309-314 - Xiaoyu Li, Nan Chen, Changhua Zhu, Changxing Pei:
Improved Efficient Priority-and-Activity-Based QoS MAC Protocol. 315-318
Session 14: Encryption and Authentication Algorithms and Protocols
- Haibo Tian:
On Security Model of One-Round Authenticated Key Exchange. 319-322 - Zhiyi Shao, Bo Yang, Yong Yu:
Private Set Intersection via Public Key Encryption with Multiple Keywords Search. 323-328 - Hao Wang, Zhihua Zheng, Yilei Wang:
A New Privacy-Preserving Broadcast Encryption Scheme from DPVS. 329-334 - Xiaotong Fu, Xiaowei Li, Wen Liu:
IDPKC-to-TPKC Construction of Multi-receiver Signcryption. 335-339
Session 15: Next-Generation Network Protocols and Components
- Yan Xu, Zhaoxia Wei, Qingrong Tang:
Efficient Algorithm for Detecting Firewall Rule Conflict. 340-343 - Yujie Hao, Wei Fang:
The Research on Algorithm for Congestion Control Based on Video Transmission. 344-347 - Mingying Wu, Jing Li, Jianhua Ge, Chensi Zhang, Florin Pop:
Impact of Channel Estimation Error on Time Division Broadcast Protocol in Bidirectional Relaying Systems. 348-352 - Shang Yun:
Guaranteed QoS Resource Scheduling Scheme Based on Improved Electromagnetism-Like Mechanism Algorithm in Cloud Environment. 353-357
Session 16: Privacy and Signatures
- Wujun Zhang, Shunrong Jiang, Xiaoyan Zhu, Yumin Wang:
Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs. 358-362 - Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Revocable Identity-Based Signature without Pairing. 363-365 - Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen:
Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010. 366-372
Session 17: Intelligent Techniques
- Zijun Wang, Jingmin Dai, Zhaoxuan Zhu:
Application of Evolutionary Neural Network in Infrared Nondestructive Test. 373-375 - Ying Gao, Waixi Liu:
Cloud Model-Based Multi-objective Estimation of Distribution Algorithm with Preference Order Ranking. 376-379 - Hongyun Xu, Youqun Shi, Qiying Cao:
BDI Goal Recognition for Agent Program Learning. 380-387
Session 18: Signature Models and Schemes
- Yannan Li, Qi Xia, Jianbing Ni, Yong Yu:
A New Construction of Proxy Signature Using Chameleon Hash Function. 388-391 - Haibo Tian:
General Certificateless Strong Designated Verifier Signature Schemes. 392-397 - Yulong Tian, Dawu Gu, Haihua Gu:
Efficient Implementation of Tate Pairing with Montgomery Ladder Method. 398-402 - Jianhua Yu, Kun Wang, Pingzhi Yuan, Xueli Wang:
Blind Signature Scheme Based on Quartic Residues. 403-407
Session 19: Software Engineering, Ontologies, and Semantics
- Boontawee Suntisrivaraporn:
A Similarity Measure for the Description Logic EL with Unfoldable Terminologies. 408-413 - Luciana Pereira Oliveira, Djamel Fawzi Hadj Sadok:
ProNet Framework: Network Management Using Semantics and Collaboration. 414-421 - David Gañán, Santi Caballé, Jordi Conesa:
Towards Software Infrastructure for the Systematic Virtualization of Collaborative Learning Sessions. 422-429
Session 20: Digital Signatures
- Jindan Zhang, Xu An Wang:
Yet Another Way to Construct Digital Signature in the Standard Model. 430-433 - Jindan Zhang, Xu An Wang:
New Construction of PVPKE Scheme Based on Signed Quadratic Residues. 434-437 - Minqing Zhang, Xu An Wang, Xiaoyuan Yang, Weiyi Cai:
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. 438-442 - Jing Zhang, Li Xu, Shuming Zhou, Wei Wu:
Constructing Connected Dominating Set Based on Crossed Cube in WSN. 443-447
Session 21: Mobile and Sensor Networks
- Chen Chen, Xiaolu Wei, Yanan Jin, Shengjin Ge:
A Delay Sensitive Time Slots Scheduling in Vehicular Sensor Networks. 448-455 - Hiroshi Tsuji, Akihiro Fujihara, Hiroyoshi Miwa:
Methods for Determining the Restoration Order of Base Nodes in the Virtual Segment Network. 456-461 - Yongping Xiong, Shizhong Wu, Tao Zhang, Yubo Deng, Shiwu Chen:
Efficient Data Gathering in Intermittent Connected Mobile Sensor Networks. 462-469
Session 22: Security and Cryptography
- Ying Sun, Jiwen Chai, Huihui Liang, Jianbing Ni, Yong Yu:
A Secure and Efficient E-Cheque Protocol from Chameleon Hash Function. 470-475 - Jing-Jing Wang, Ping Wei, Jiayong Chen:
Research on the Degeneration Problem of Key Sequence Based on Chaos. 476-479 - Haiyan Xiao, Xiaoyuan Yang:
Secure Multi-party Confidential Protocol of Matrix Factorization. 480-484 - Fei Tang, Changlu Lin, Hongda Li:
ID-Based Signcryption with Restrictive Unsigncryption. 485-489
Session 23: Security Resilience and Signatures
- Ning Zhang, Xiaotong Fu:
Ternary Method in Elliptic Curve Scalar Multiplication. 490-494 - Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Proxy Signatures. 495-502 - Huai Wu, Chunxiang Xu, Jiang Deng:
A Server-Aided Aggregate Verification Signature Scheme from Bilinear Pairing. 503-506 - Ning Zhang, Shichong Tan:
Elliptic Curve Scalar Multiplication Based on Fibonacci Number. 507-510
Session 24: Trust and Sharing
- Xiuqun Wang, Changlu Lin, Yong Li:
Proactive Secret Sharing without a Trusted Party. 511-515 - Yuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong:
Fault and Intrusion Tolerance of Complex Networks: A Controllability View. 516-520 - Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang:
Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures. 521-527 - Qingqi Pei, Conglin Wang, Zi Li:
Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio Networks. 528-534
Session 25: Encryption, Information Storage, and Retrieval
- Wei Zhang, Shuguang Liu, Xiaoyuan Yang:
RLWE-Based Homomorphic Encryption and Private Information Retrieval. 535-540 - Chuan Yao, Li Xu, Xinyi Huang:
A Secure Cloud Storage System from Threshold Encryption. 541-545 - Jie Liu, Bo Yang, Zhiguo Du:
Outsourcing of Verifiable Composite Modular Exponentiations. 546-551 - Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong:
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. 552-559
Session 26: Signature Models and Schemes
- Jingquan Wang, Guilin Wang, Willy Susilo:
Anonymous Single Sign-On Schemes Transformed from Group Signatures. 560-567 - Shangping Wang, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang:
Lattice-Based Multi-party Concurrent Signatures Scheme. 568-572 - Yanling Lian, Li Xu, Xinyi Huang:
Attribute-Based Signatures with Efficient Revocation. 573-577 - Zhenhua Liu, Xiangsong Zhang, Tsuyoshi Takagi:
Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles. 578-585
FINCoS 2013-Second International Workshop on Frontiers in Intelligent Networking and Collaborative Systems
Session 1: Security, Encryption, and Authentication Services
- Zhen Liu, Xiaoyuan Yang:
Public Verifiable Key Encapsulation Mechanism under Factoring. 586-590 - Haiyan Xiao, Minqing Zhang:
Provably-Secure Certificateless Proxy Re-signature Scheme. 591-594 - Zhizhao Zhou:
Research on Cloud Computing Based Data Processing for Financial Terminal Equipment. 595-598 - Yangjing Zhong, Xiangyang Li:
Intelligent Network Course Platform Based on Agent. 599-601
Session 2: Intelligent Data Processing, Optimization, and Analysis
- Cailin Li, Dongmei Wang:
The Permanent Magnet Synchronous Linear Motor Position Control Based on Fuzzy Neural Network. 602-606 - Xiaomao Chen, Shan Ouyang:
Low-Complexity Resource Allocation in Rate-Constrained OFDMA Downlink Systems. 607-610 - Xiangyang Li:
Design of Array Signal Processing System Based on TMS320C6678. 611-616 - Adipat Larprattanakul, Taratip Suwannasart:
An Approach for Regression Test Case Selection Using Object Dependency Graph. 617-621
CNT 2013-International Workshop on Communications and Network Theory
Session 1: Communication Theory and Tools
- Jingyi Wang, Shuling Che, Ying Li, Junlong Wang:
Optimal Design of the Joint Network LDPC Codes for Half-Duplex Cooperative Multi-access Relay Channel. 622-625 - Rong Sun, Jingwei Liu:
Distributed SR-LDPC Codes over Multiple-Access Relay Channel. 626-628 - Huiqin Liu, Shubin Wang, Fei Li, Shaowen Zhan:
Research on Optimization for Cooperative Spectrum Sensing Based on Double Threshold Energy Detection. 629-632 - Xin Cai, Rong Sun, Jingwei Liu:
An Ultrahigh Speed AES Processor Method Based on FPGA. 633-636 - Lu Zhang, Jingwei Liu, Rong Sun:
An Efficient and Lightweight Certificateless Authentication Protocol for Wireless Body Area Networks. 637-639
Session 2: Cipher Theory and Analysis
- Tongjiang Yan, Yanyan Liu:
Linear Complexity of Binary Generalized Cyclotomic Sequences of Order 6 over Zpq. 640-644 - Tongjiang Yan, Pan Xu:
A New Polyphase Generalized Sequence of Length pq and Its Linear Complexity. 645-648 - Lin-Sen Zhao, Jing-Mei Liu:
(t, n) Threshold Digital Signature Scheme with Traceable Signers against Conspiracy Attacks. 649-651 - Jingmei Liu, Shaopeng Chen, Linsen Zhao:
Lagrange Interpolation Attack against 6 Rounds of Rijndael-128. 652-655
ESN 2013-First International Workshop on Evolution of Social Networks
Session 1: Networks
- Weiguo Yuan, Yun Liu:
Empirical Analysis and Evolution Modeling of Network Topological Structure in Microblog. 656-661 - Tomás Jezowicz, Milos Kudelka, Jan Platos, Václav Snásel:
Visualization of Large Graphs Using GPU Computing. 662-667 - Pavel Krömer, Milos Kudelka, Zdenek Horak, Václav Snásel:
Evolution of Scale-Freeness in a Co-authorship Network. 668-672
Session 2: Theoretical Background
- Peng Luo, Ping Wei, Yiqun Liu:
A Color Digital Watermarking in Nonsampled Contourlet Domain Using Generic Algorithm. 673-676 - Xu An Wang, Jinting Nie, Yi Ding, Junru Hu:
Toward Construction of PVPKE in the Standard Model Based on Factoring Assumption. 677-680 - Ping Wei, Shuaishuai Zhu:
An Improved Secure Unidirectional Proxy Re-encryption Scheme. 681-684
IPA 2013-International Workshop on Image Processing and Applications
Session 1: Image Processing and Applications
- Caixia Li, Chanjuan Liu, Yilei Wang:
Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation. 685-690 - Jian Lin, Bo Peng, Tianrui Li, Qin Chen:
A Learning-Based Framework for Image Segmentation Evaluation. 691-696 - Zhiyong Zeng, Jianqiang Hu:
Face Recognition Based on Shearlets Transform and Principle Component Analysis. 697-701 - Guang Zheng, Shunichiro Oe, Zengguo Sun:
Moving Object Tracking and 3D Measurement Using Two PTZ Cameras. 702-707
Session 2: Security Processing and Machine Learning Applications
- Jianlong Zhang, Xinbao Gao:
A Hybrid Encryption Scheme for Scalable Video Coding Based on H.264. 708-711 - Gaoyu Zhang, Yingying Wang:
A Real-Time Template Generation Algorithm to Identify RMB Crest Number. 712-715 - Junxiu Zhou, Shigang Liu, Guoyong Qiu, Fengmin Zhang, Jiancheng Sun:
Tensor Missing Value Recovery with Tucker Thresholding Method. 716-720 - Yali Peng, Shigang Liu, Hong Fan, Jiamei Gao, Jiancheng Sun:
A Spatially Varying Mean and Variance Active Contour Model. 721-725
Session 3: Intelligent Processing and Applications
- Hongmin Xue, Zhijing Liu:
Pedestrian Classification Based on Improved Support Vector Machines. 726-730 - Heng Liu:
Fast 3D Ear Recognition Based on Local Surface Matching and ICP Registration. 731-735 - Chengwu Lu, Daoqing Zhou:
Image Decomposition Using Bregman-GTV and Meyer's G-Norm. 736-740 - Zhao Zhong, Gang Shen, Wenhu Chen:
Facial Emotion Recognition Using PHOG and a Hierarchical Expression Model. 741-746 - Yujie Hao, Chao Yan:
Design and Implementation of Android Contacts Synchronization System Based on the SyncML Protocol. 747-750
IWCBFS 2013-International Workshop for Collaborative e-Business Systems
Session 1: E-Business, E-Commerce, and Supply Chains
- Kai Wei, Juanqiong Gou, Rui Chai, Wei Dai:
Creation of Customer Evaluation Model in the Catering Industry Supply Chain Ecosystem. 751-756 - Matteo Gaeta, Francesco Orciuoli, Pierluigi Ritrovato, Giuseppe D'Aniello, Alfonso De Vivo:
A Collective Knowledge System for Business Partner Co-operation. 757-762 - Paul Moynihan, Wei Dai:
Framework for Real-Time Process Modeling of Supply Chains. 763-768 - Zenghui Zhao, Jingnong Weng, Huaizhou Wang, Junyi Zhao, Jingui Li, Anda Li:
On Three-Dimensional Digital Earth Application Development Framework and Its Applications. 769-774 - Fuzhi Chu, Runtong Zhang, Rongqian Ni, Wei Dai:
An Improved Database Inspection System for E-commerce Companies Based on Web Data Mining. 775-779
SCC 2013-International Workshop on Secure Cloud Computing
Session 1: Secure Cloud Computing
- Hua Deng, Bo Qin, Ruiying Du, Huanguo Zhang, Lina Wang, Jianwei Liu, Jian Mao:
Finding Key Leakage in Hierarchical Distribution of Encrypted Data. 780-785 - Tuo He, Wenping Ma:
An Effective Fuzzy Keyword Search Scheme in Cloud Computing. 786-789 - Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang:
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features. 790-795 - Yiliang Han, Wanyi Lu, Xiaoyuan Yang:
Attribute-Based Signcryption Scheme with Non-monotonic Access Structure. 796-802
Session 2: Secure Data Storage and Networking
- Jie Zhang, Futai Zhang:
Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups. 803-808 - Bao Liu, Lei Zhang:
An Improved Identity-Based Batch Verification Scheme for VANETs. 809-814 - Yaling Zhang, Zhipeng Jia, Shangping Wang:
A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System. 815-820 - Yongqiang Zhang, Qiang Liu, Haibo Tian:
A Hybrid System for Authentication Service. 821-826
WIND 2013-Fifth International Workshop on Information Network Design
Session 1: Keynote Talk
- Akira Arutaki:
Networking Technology Trend in Japan, Toward Earth-Friendly Infrastructure. 827-828
Session 2: Information Network Design
- Kohei Nishida, Hiroyoshi Miwa:
Network Design Problem by Link Protection to Keep Small Increase of Path Length during Link Failures. 829-834 - Akira Nagata, Yoshiaki Tsukiji, Masato Tsuru:
Delivering a File by Multipath-Multicast on OpenFlow Networks. 835-840 - Mario Köppen, Kei Ohnishi, Masato Tsuru:
Multi-Jain Fairness Index of Per-Entity Allocation Features for Fair and Efficient Allocation of Network Resources. 841-846 - Xiaotong Fu, Shufang Guo, Ruijun Shi:
An Efficient Tripartite Identity-Based Authenticated Key Agreement Protocol. 847-851
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.