default search action
EUC 2008: Shanghai, China
- Cheng-Zhong Xu, Minyi Guo:
2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops. IEEE Computer Society 2008
Workshop TSP-08, Session 1: Secure Schemes and Metrics
- Sancheng Peng, Weijia Jia, Guojun Wang:
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. 3-9 - Yahui Li, Ding Yong, Jianfeng Ma:
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. 10-15 - Atsushi Koide, Raylin Tso, Eiji Okamoto:
A Sanitizing Signature Scheme with Indexing. 16-21 - Ewa Idzikowska, Krzysztof Bucholc:
Error Detection Schemes for CED in Block Ciphers. 22-27 - Song Huang, Lie-Gen Liu:
An Impact-Oriented Metric for Interference to Network Routing. 28-33
Workshop TSP-08, Session 2: Trust Management and Privacy Protection I
- Jae Hun Lee, Jin Kyu Park, Sang Wook Kim:
User-Directed Privacy Protection in the Ubiquitous Environment. 37-42 - Zhuo Ma, Jianfeng Ma, Yulong Shen:
Provably Secure Trusted Access Protocol for WLAN Mesh Networks. 43-48 - Dong Zhou, Hiroshi Inamura:
Towards Trustworthy and Secure Kiosk Computing for Mobile Users. 49-54 - Ying Jin, Zepeng Li, Da Wei, Lei Liu:
Automatic Generation and Enforcement of Security Contract for Pervasive Application. 55-60 - Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis:
A Qualitative Risk Analysis for the GPRS Technology. 61-68
Workshop TSP-08, Session 3: Trust Management and Privacy Protection II
- Hongyan Mao, Yixiang Chen:
Research of a Multi-dimension Measurement Trusting Model Based on Markov Chain. 71-76 - Atsushi Koide, Raylin Tso, Eiji Okamoto:
Convertible Undeniable Partially Blind Signature from Bilinear Pairings. 77-82 - Guanling Chen, Faruq Rahman:
Analyzing Privacy Designs of Mobile Social Networking Applications. 83-88 - Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang:
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. 89-93 - Marion Blount, John Davis, Maria Ebling, William F. Jerome, Barry Leiba, Xuan Liu, Archan Misra:
Privacy Engine for Context-Aware Enterprise Application Services. 94-100 - Peng Xiong, Wei Zhang:
The Trustworthiness Based on Hash Chain in Wireless Sensor Network. 101-106 - Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai:
Trust Similarity Measure in Trust Model for P2P Networks. 107-112
Workshop TSP-08, Session 4: Encryption and Decryption I
- Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Distance Bounding Protocol for Multiple RFID Tag Authentication. 115-120 - Chien-Pen Chuang, Tin-Ying Huang, Li-Chi Yeh:
Encryption and Decryption with Space Transformation for Bi-directional Association. 121-126 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain:
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. 127-132 - Daigo Muramatsu:
Online Signature Verification Algorithm Using Hill-Climbing Method. 133-138 - Huawei Zhao, Jing Qin, Zhifeng Fang:
Converters for Designing Applied Cryptographic Protocols. 139-143 - Haojun Zhang, Xiaoxue Li, Rui Ren:
A Novel Self-Renewal Hash Chain and Its Implementation. 144-149
Workshop TSP-08, Session 5: Encryption and Decryption II
- Tae Youn Won, Ji Young Chun, Dong Hoon Lee:
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. 153-158 - Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li:
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework. 159-166 - Baokang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su, Yanqin Yang:
Towards Successive Privacy Protection in Sensor Networks. 167-172 - Alan McCabe, Jarrod Trevathan:
Markov Model-Based Handwritten Signature Verification. 173-179 - Yanfei Liu:
An Efficient RFID Authentication Protocol for Low-Cost Tags. 180-185 - Bhavani Thuraisingham, Pranav Parikh:
Trustworthy Semantic Web Technologies for Secure Knowledge Management. 186-193
Workshop TSP-08, Session 6: Key Management
- Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung:
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. 197-201 - Yanjiang Yang, Feng Bao, Robert H. Deng:
Efficient Client-to-Client Password Authenticated Key Exchange. 202-207 - Biming Tian, Song Han, Tharam S. Dillon:
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. 208-215 - Ping Li, Jiaying Wu, Jingming Xue:
Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks. 216-221 - Reza Azarderakhsh, Arash Reyhani-Masoleh, Zine-Eddine Abid:
A Key Management Scheme for Cluster Based Wireless Sensor Networks. 222-227 - Yuan Xue, Helmut Jürgensen, Reza Azarderakhsh, Arash Reyhani-Masoleh:
Key Management for Wireless Sensor Networks Using Trusted Neighbors. 228-233 - Longjun Zhang, Tao Zou:
An Improved Key Management Scheme for WEP. 234-239
Workshop TSP-08, Session 7: Access Control and Anonymity
- Vincent C. Hu, D. Richard Kuhn, Tao Xie:
Property Verification for Generic Access Control Models. 243-250 - Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang:
ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework. 251-256 - Minh-Triet Tran, Trung Thanh Nguyen, Isao Echizen:
Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition. 257-263 - Yue Zhang, James B. D. Joshi:
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. 264-271 - Xiaofeng Lu, Pan Hui, Pietro Liò, Zhang Xiong:
Identity Privacy Protection by Delayed Transmission in Pocket Switched Networks. 272-277 - Jun Li, Bruce Christianson:
A Domain-Oriented Approach for Access Control in Pervasive Environments. 278-284 - José Bringel Filho, Hervé Martin:
Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments. 285-290
Workshop TSP-08, Session 8: Security and Privacy in Wireless Networks
- Apivadee Piyatumrong, Pascal Bouvry, Frédéric Guinand, Kittichai Lavangnananda:
Trusted Spanning Tree for Delay Tolerant MANETs. 293-299 - Feilong Tang, Minyi Guo, Minglu Li, Zhijun Wang, Zixue Cheng:
Scalable and Secure Routing for Large-Scale Sensor Networks. 300-305 - Gicheol Wang, Deokjai Choi, Daewook Kang:
Securing Wireless Sensor Networks Using Cluster Reformations. 306-311 - Meng Ge, Kwok-Yan Lam, Jian-Bin Li, Siu Leung Chung:
Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. 312-317 - Wei Ren, Yi Ren, Hui Zhang:
HybridS: A Scheme for Secure Distributed Data Storage in WSNs. 318-323 - Hyuncheol Kim, Jungha Paik, Bumhan Lee, Dong Hoon Lee:
SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment. 324-329
Workshop TSP-08, Session 9: Secure Services and Security Analysis
- Wenbin Luo, Gregory L. Heileman:
Exponential Hashing in Finite Fields. 333-338 - Chaowang Shang, Zongkai Yang, Qingtang Liu, Chengling Zhao:
A Context Based Dynamic Access Control Model for Web Service. 339-343 - Chun-Chao Yeh:
Secure and Verifiable P2P Card Games. 344-349 - Xiang Fan, Yang Xiang:
Defending against the Propagation of Active Worms. 350-355 - Joongman Kim, Seokung Yoon, Hyuncheol Jeong, Yoojae Won:
Implementation and Evaluation of SIP-Based Secure VoIP Communication System. 356-360 - Nicolai Kuntze, Julian Schütte:
Securing Decentralized Workflows in Ambient Environments. 361-366 - Yawen Wang, Yunzhan Gong, Junliang Chen, Qing Xiao, Zhaohong Yang:
An Application of Interval Analysis in Software Static Analysis. 367-372
Workshop EUV-08
- Deshi Ye, Qinming He, Hua Chen, Jianhua Che:
A Framework to Evaluate and Predict Performances in Virtual Machines Environment. 375-380 - Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang:
Performance Measuring and Comparing of Virtual Machine Monitors. 381-386 - Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang:
An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software Deployment. 387-392 - Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng:
Analysis and Enhancement for Interactive-Oriented Virtual Machine Scheduling. 393-398 - Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao:
DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture. 399-404 - Ran Zheng, Xiaofei Liao, Hai Jin:
A Novel Virtual Grid Experiment Method in MedImGrid. 405-410 - Kang Chen, Jun Xin, Weimin Zheng:
VirtualCluster: Customizing the Cluster Environment through Virtual Machines. 411-416 - Jiong Yu, Guozhong Tian, Ling Cheng:
Allocating Resource in Grid Workflow Based on State Prediction. 417-422 - Yanbin Peng, Bei Shui Liao, Ji Gao, Jun Hu, CunHao Wang, Jie-Qing Ai, Hang Guo:
Cooperative Problem Solving Process Based on MAS_NP Model. 423-427
Workshop SEQUBIQ-08
- Kazumasa Omote, Atsuko Miyaji, Kazuhiko Kato:
Simple Certificateless Signature with Smart Cards. 431-436 - Jiang Han, Qiuliang Xu, Guohua Chen:
Efficient ID-based Threshold Ring Signature scheme. 437-442 - Raphael C.-W. Phan, Bok-Min Goi:
(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map. 443-446
Workshop ESO-08
- Shenglin Gui, Lei Luo, Qian Liu, Fulei Guo, Shaopeng Lu:
UCaS: A Schedulability Analysis Tool for AADL Models. 449-454 - Shan Ding, Zhiqiang Xie, Xiaona Yin:
A GA-based Systematic Message Scheduling Method for Time-Triggered CAN. 455-460 - Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö:
Reducing Context Switch Overhead with Compiler-Assisted Threading. 461-466 - Bing Guo, Yan Shen, Lei Zhang, Xiang Zhou:
Research and Design of Shared Resources Competition Solution among Hardware-Software Tasks based on Unified Scheduling. 467-471 - Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito:
A Tiny Processing System for Education and Small Embedded Systems on the FPGAs. 472-479 - Chun-Chieh Lin, Chuen-Liang Chen:
Object Placement for Fully Associative Cache. 480-485 - Kai Zheng, Yongxin Zhu, Jun Xu:
Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor Simulator. 486-491
Workshop NCUS-08
- Tian-Wen Song, Chu-Sing Yang:
A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks. 495-500 - Wenjun Xiao, Mingxin He, Wenhong Wei:
CayleyChord: A Novel P2P Overlay Network. 501-506 - Ke Xu, Yahui Yang, Tao Chen:
Improving BitTorrent Network's Performance via Deploying Helpers. 507-512 - Zhi Chen, Guowei Huang, Jingdong Xu, Yang Yang:
Adaptive Load Balancing for Lookups in Heterogeneous DHT. 513-518 - Simone Cintra Chagas, Eber Huanca Cayo, Koji Nakano, Jacir Luiz Bordim:
The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM Networks. 519-523 - Lei He, Xiangjie Ma, Weili Zhang, Yunfei Guo, Hailong Ma:
The Analysis and Simulation of a Hybrid Video Broadcast Architecture. 524-531 - Slim Trabelsi, Guillaume Urvoy-Keller, Yves Roudier:
On the Impact of DoS Attacks on Secure Service Discovery. 532-537 - Nicole R. Nagel, Ruzbeh Shokranian, Jacir Luiz Bordim, Koji Nakano:
MAC Layer Misbehavior on Ad Hoc Networks. 538-542 - Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar:
CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking. 543-548 - Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou:
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. 549-552 - Gyeongtaek Lee, Jonghun Shin, Dae-Won Park, Hyuk-Chul Kwon:
Discovery Architecture for the Tracing of Products in the EPCglobal Network. 553-558 - Jindian Su, Shanshan Yu, Heqing Guo:
Analysis of Web Service Substitutability Based on Typed Pi-Calculus. 559-564 - Qi Liu, Nigel Linge:
A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment. 565-570 - Yu Huang, Bo Liu, XianPing Tao, Jiannong Cao, Beihong Jin:
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks. 571-576 - Eunhoe Kim, Jaeyoung Choi:
A Context Management System for Supporting Context-Aware Applications. 577-582
Workshop TRUST-08, Session 1: Data Mining and Security
- Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen:
Data Mining for Security Applications. 585-589 - Longjun Zhang, Tao Zou:
A Trusted Third Party Based Secure Authentication Scheme of E-Commerce. 590-594 - Raphael C.-W. Phan, Bok-Min Goi:
Attacks on Improved Key Distribution Protocols with Perfect Reparability. 595-599
Workshop TRUST-08, Session 2: Trust Computing
- Omar Hasan, Jean-Marc Pierson, Lionel Brunie:
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation. 603-609 - Mieso K. Denko, Tao Sun:
Probabilistic Trust Management in Pervasive Computing. 610-615 - Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki:
Discovering the Most Trusted Agents without Central Control. 616-621
Workshop TRUST-08, Session 3: Service Computing and Management
- Won-Hee Han, Sung-Won Kim, Sun-Mi Park, Chang-Wu Lee, Jong Hyuk Park, Young-Sik Jeong:
Large-Scale USN Middleware Based on Context-Aware. 625-631 - Qiming Pan, Xiaoxia Huang:
Mean-Variance Model for International Portfolio Selection. 632-636 - Jia Zhang, Di Xu:
A Mobile Agent-Supported Web Services Testing Platform. 637-644
Workshop UUWSN-08, Session 1: Applications
- Hyung-jun Ju, Se-Young Kim, Jung-woo Han, Ki-Man Kim, Seok-yeb Kang:
Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater Speech Communication. 647-650 - Qian Sun, Shanqing Guo, Qiuliang Xu:
Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN. 651-654 - Phil-Jung Yun, Changhwa Kim, Sangkyung Kim:
ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol. 655-659
Workshop UUWSN-08, Session 2: Protocols
- Heungwoo Nam, Sunshin An:
Energy-Efficient Routing Protocol in Underwater Acoustic Sensor Networks. 663-669 - Hung Trong Nguyen, Soo Young Shin, Soo-Hyun Park:
Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks. 670-675 - Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim:
Scalable Uniformly-Distributed Clustering Mechanism for Sensor Networks. 676-681
Workshop UUWSN-08, Session 3: Systems
- Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park:
Point-to-Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks. 685-688 - Soo Young Shin, Soo-Hyun Park:
Omnet++ Based Simulation for Underwater Environment. 689-694
Workshop UWMN-08, Session 1: Ubiquitous Computing in Wireless Sensor Networks
- Liang-Cheng Shiu, Chao-Yang Lee, Tian-Wen Song, Chu-Sing Yang:
On-Demand Deployment Algorithm for a Hybrid Sensor Network. 697-702 - Mianxiong Dong, Gongwei Zhang, Kaoru Ota, Song Guo, Minyi Guo:
An Improved Design of the Ubiquitous Learning System Based on Sensor Networks. 703-708
Workshop UWMN-08, Session 2: Ubiquitous Computing in Wireless Ad Hoc Networks
- Jiangwei Zhou, Boqin Feng, Gangqiang Wei:
A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols. 711-716 - Usman Ashraf, Slim Abdellatif, Guy Juanole:
Route Stability in Wireless Mesh Access Networks. 717-722 - Hao Xu, Dejun Mu:
A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network. 723-728
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.