Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2004678guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
CMC '11: Proceedings of the 2011 Third International Conference on Communications and Mobile Computing
2011 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
April 18 - 20, 2011
ISBN:
978-0-7695-4357-4
Published:
18 April 2011

Reflects downloads up to 22 Nov 2024Bibliometrics
Abstract

No abstract available.

Article
Cover Art
Article
Article
Title Page iii
Article
Article
Preface
Article
Reviewers
Article
Article
A Security Policy of WLAN Data Transmission Based on Logistic Chaotic Modulation

Analyzing on WEP (Wired Equivalent Privacy) indicates many defects existing in security. A security policy of WLAN data transmission based on logistic chaotic modulation is presented. The improved Logistic mapping can carry information in the WLAN data ...

Article
B-IRP: An Improving Integrity Report Protocol for Remote Attestation

Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation requirement frequently, the massive ...

Article
Efficient Taint Analysis with Taint Behavior Summary

Software security has drawn much attention recently. As an effective approach to detect software vulnerabilities and improve software security, dynamic taint analysis has been frequently researched in the last few years. In this paper, we implement a ...

Article
High-Speed Architecture Design and Implementation for SMS4-GCM

A new and high-efficiency encryption and authentication algorithm, SMS4-GCM, based on cryptographic algorithm SMS4 and block cipher operating mode GCM is proposed. Design using full pipeline architecture and implementation on FPGA are presented in ...

Article
Observation and Analysis on Spam Sending Behavior

Due to Internet, people prefer using emails instead of traditional post mails, because of its simple and easy to use. Meanwhile unsolicited emails (spam) become a serious problem, as sending bulk emails are almost cost free in terms of time and money. ...

Article
Temporal Ordered Image Encryption

The existing image encryption algorithms encrypt images independently, which means the probability of an eavesdropper working out one image stays the same under the same circumstances (same bits of keys and the same algorithm, for example). However, in ...

Article
The Power of Refresh: A Novel Mechanism for Securing Low Entropy PII

Deterministic encryption for low entropy personally identifiable information(PII) is vulnerable to dictionary attack. It is particularly so because of an expedient method to enumerate possible PII'splain text instead of all possible keys. Deterministic ...

Article
Practicality Analysis of the Self-Healing Group Key Distribution Schemes for Resource-Constricted Wireless Sensor Networks

A number of self-healing group key distribution schemes have been proposed recently, however, though practicality analysis and simulation of the commonly used self-healing group key distribution schemes, we show that almost none of the existing schemes ...

Article
The Analysis and Optimization on M-commerce Secure Payment Model

The M-Commerce has incomparable superiorities compared with traditional e-commerce. And at the same time, it has brought forward higher request of the security. The thesis analyzes the business model of M-Commerce secure payment, the SeMoPS model, and ...

Article
A Collaborative Network Security Management System in Metropolitan Area Network

Network Security Appliances are deployed at the vantage point of the Internet to detect security events and prevent attacks. However, these appliances are not so effective when it comes to distributed attacks such as DDoS. This paper presents a design ...

Article
A New Intrusion Detection System Using Class and Sample Weighted C-support Vector Machine

whenever an intrusion occurs, the security of a computer system is compromised. Presently there are a lot of algorithms applied in intrusion detection systems. The SVM is one of the most successful ones in the data mining area, but its biasing behavior ...

Article
Formal Analysis of Trusted Computing: One Case Study

LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. With the support of changed LS2, we ...

Article
NetSecu: A Collaborative Network Security Platform for In-network Security

Malicious attacks are frequently launched to make specified network service unavailable, compromising end hosts for political or business purpose. Though network security appliances are widely deployed to resist these attacks, there is a lack of dynamic ...

Article
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study

Access control is essential to computer security, especially in an open, distributed, networked communication environment. Modern access control model such as UCON aims at accommodating general requirements. Traditional one such as BLP focuses on ...

Article
TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution

Content pollution problem has attracted broad attention due to its impacts on P2P networks' efficiency and availability. Especially for Bit Torrent users, unmanageable versions of BT torrents and chunk-based file sharing mode make it more difficult to ...

Article
Analysis and Design of Automatic Code Generation System Based on J2EE

This thesis is about how to convert the design results based on a relational database on J2EE Platform to codes quickly, which in practice allows developers more time and energy to focus on the analysis and researching work on service logic, without ...

Article
Apad: A QoS Guarantee System for Virtualized Enterprise Servers

Today's data center often employs virtualization to allow multiple enterprise applications to share a common hosting platform in order to improve resource and space utilization. It could be a greater challenge when the shared server becomes overloaded ...

Article
The Study on E-commerce Security Based on ECC and SET

Based on the requirements of identity authentication because of the development of E-Commerce, this thesis discusses the difference between SET and SSL protocol, the technical advantages of ECC compared with RSA, and technical strategy of realizing the ...

Article
Trustworthy Service Selection Scheme Based on Attribute Signature

A fundamental challenge in service-oriented computing (SOC) is to select trustworthy Service. Existing approaches for service selection fail to capture the dynamic trust relationships between stranger services. Automatic trust negotiation (ATN)is a new ...

Article
A Reconfigurable SoC for Block Ciphers with a Programmable Dataflow Structure

Reconfigurable architecture is considered as very efficient, attack resistant and suitable for cryptograph applications. But the low utilize ratio of on-chip resources and lack of software programmability of traditional reconfigurable arrays draws the ...

Article
A Universal and Optimized Embedded System to Control Firing Angle of Thyristors with Double-Sided Isolation

This paper describes the implementation of a double sided isolated, economical, easy to implement and optimized approach to design a digital firing angle control system for silicon controlled rectifiers (SCR) and triacs. Currently designed circuits for ...

Article
Model-Based Simulation Testing for Embedded Software

In this paper Model-based Simulation Testing Framework (MSTF) will be introduced. The basic principles of the MSTF, associated technology and tools are then presented in detail and include both strategy and process of defining test methods as well as ...

Article
Study on Mobile Phone-Based Speech Processor for Cochlear Implant

This paper describes an implementation of a cochlear implant speech signal processing platform by using a windows mobile phone. This platform implemented the speech signal acquisition, speech signal processing, liquid crustal displaying, controlling and ...

Index Terms

  1. Proceedings of the 2011 Third International Conference on Communications and Mobile Computing
    Index terms have been assigned to the content through auto-classification.
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations