Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1441425guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
NPC '08: Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
2008 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
October 18 - 21, 2008
ISBN:
978-0-7695-3354-4
Published:
18 October 2008

Reflects downloads up to 04 Oct 2024Bibliometrics
Abstract

No abstract available.

Article
Cover Art
Article
Article
Title Page iii
Article
Preface
Article
A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks

As various applications of sip-based VoIP networks have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we present a certificate-based two party authentication key agreement ...

Article
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem

Many emerging network applications are based upon group communication models and are implemented with multicast communications. We address the problem of distributing a secret session key to a secure multicast group. In a pair of such key management ...

Article
Conditional Privacy Using Re-encryption

This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system. Firstly, a secure protocol to distribute a re-encryption key from a user A to a service provider B, with the help of n ...

Article
Using Outlier Detection to Reduce False Positives in Intrusion Detection

Intrusion Detection Systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e. alerts that are triggered incorrectly by benign events). This makes it extremely difficult for managers to analyze and react ...

Article
Identity-Based On-Line/Off-Line Signcryption

We present an identity-based on-line/off-line signcryption scheme, where most of computations are carried out when the message is not available (i.e., off-line stage) and the on-line part of our scheme does not require any exponent computations and ...

Article
Attribute Delegation Authorization Based on Subjective Trust Evaluation

Trust-based delegation authorization mechanism is regarded as an effective method for computational resource access in open dynamic environment. One important problem is how to apply more grain subjective trust control on delegation and authorization ...

Article
A Multi-core Supported Intrusion Detection System

Integrated multi-core processors with on-chip application acceleration have established themselves as the most efficient method of powering next-generation networking platforms. New research has been conducted for addressing the issues of multi-core ...

Article
Synchronization of Discrete Chaotic Dynamical Systems Using Active Control

In this paper, both synchronization and generalized synchronization of two discrete chaotic dynamical systems are studied using active control. Specially, for maps operating under non-identical parameter, we validated that the dynamics of the response ...

Article
Secure Prophet Address Allocation for Mobile Ad Hoc Networks

A mobile node in a MANET must be assigned with a free IP address before it may participate in unicast communications. This is a fundamental and difficult problem in the practical application of any MANET. There have been several solutions proposed, ...

Article
Two Security Problems of RFID Security Method with Ownership Transfer

Radio Frequency Identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem. ...

Article
Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions

This paper presents a new stream cipher for data security, which is based on the replacement of data values using variable ordered recursive cellular automata (CA) substitutions. To achieve this aim, 2-D hybrid CA was built firstly, then 1st-ordered and ...

Article
Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm

Byun et al. proposed a cross-realm client-to-client password-authenticated key exchange (C2C-PAKE) protocol in ICICS'02. The protocol enables two clients in different realms to agree on a common session key by using different passwords. In this paper, ...

Article
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism

Using high-level security policy rules to regulate low-level system, the security management system with a high level of expansibility and flexibility was made. For purpose of managing network security policy duly and flexibly in the complex network ...

Article
Experimental Tests on SCTP over IPSec

As telecommunication technologies evolve, security in communications becomes a more and more relevant issue. IPSec is a set of protocols aiming to enhance security at the IP layer. Specifically, IPSec and IKE are important security mechanism that ...

Article
A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks

Data aggregation is a fundamental building block in sensor networks for power-efficient data collecting, thereby it is important to protect it from attack. In this paper, we consider defending against attackers who intend to stealthily change the ...

Article
Ontology-Based Knowledge Representation for a P2P Multi-agent Distributed Intrusion Detection System
Pages 111–118

Many research efforts on application of ontology in network security have been done in the past decade. However, they mostly stop at initial proposal or focus on framework design without detailed representation of intrusion or attack and relevant ...

Article
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication

The recent growth of multimedia group of applications is driving the need for secure multicast communication. Secure Multicast communication in dynamic environments like wireless networks and Grids are potentially of critical concern. As Multicast group ...

Article
Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection

Piromsopa and Enbody [10] proposed Secure Bit, an architectural approach to protect against buffer-overflow attacks on control data (return-addresses and function pointers). This paper explores the possibility of extending Secure Bit to protect non-...

Article
An Improved Method for Ranking of Search Results Based on User Interest

The most common task for a forensic investigator is to search a hard disk to find interesting evidences. While, the most search tools in digital forensic field fundamentally utilize text string match and index technology, which produce high recall (100%)...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations