By Topic

Computer and Computational Sciences, 2006. IMSCCS '06. First International Multi-Symposiums on

Date 20-24 June 2006

Go

Filter Results

Displaying Results 1 - 25 of 148
  • First International Multi-Symposiums on Computer and Computational Sciences - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • First International Multi-Symposiums on Computer and Computational Sciences - Title page

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (327 KB)
    Freely Available from IEEE
  • First International Multi-Symposiums on Computer and Computational Sciences - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • First International Multi-Symposiums on Computer and Computational Sciences - TOC

    Publication Year: 2006, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Preface - Message from General and Program Chairs

    Publication Year: 2006, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (35 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizations

    Publication Year: 2006, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • A Bio-inspired Multidimensional Network Security Model

    Publication Year: 2006, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. While, current network security researches on bio-inspired are all limited in the layer of human body - immune system. On the basis of current research in bio-inspired domain and aiming at the limitation of these relative research, this paper puts forwards bio-inspired multidimensional netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol

    Publication Year: 2006, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    In this paper we analyze an ID-based key issuing protocol due to Gangishetti et al., designed for eliminating the need of secure channel between PKG and users and avoiding the key escrow problem. Their protocol consists of five sub-protocols, namely system setup, system public key setup, key issuing, key securing and key retrieving. We show that both the key issuing and the key securing sub-protoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improvement of an Identity-Based Key Issuing Protocol

    Publication Year: 2006, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    At TCP ADS 2005, Sui et al. proposed a novel separable and anonymous ID-based key issuing scheme without secure channel, and claimed the key-escrow problem has been solved. In this paper, we present a security analysis on their schemes and point out that their two protocols are not secure and they do not solve the key-escrow problem. Further, we present an improved key issuing protocol which is pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Real-time Judging System of Figure Skating Based-on WLAN

    Publication Year: 2006, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Wireless LAN can quickly and conveniently resolve the problems of network connectivity, which are difficult for LAN based on wire. Basing on above advantages and the application of Figure Skating, we develop the real-time judging system of Figure Skating. It implements the video replaying which bases on DirectShow technology of COM criteria. The system is not only characterized by excellent mobili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Mobile IPv6 Application Based On Diameter Protocol

    Publication Year: 2006, Page(s):25 - 29
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    The diameter protocol is recommended by IETF as AAA (authentication, authorization and accounting) protocol criterion for the next generation network. Because the IPv6 protocol will be widely applied in the intending all-IP network, mobile IPv6 application based on diameter protocol will play more important role in authentication, authorization and accounting. In this paper, the implementation of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Quantitative Analysis Method for Network Survivability

    Publication Year: 2006, Page(s):30 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Through analyzing the changes of key services' performance index value before and after evaluation, this paper proposed a novel quantitative analysis method for network survivability based on grey relational analysis. Starting with the normalization of decision matrix with interval number, the proposed method firstly applied grey relational analysis to assess the best affiliate degree and survival... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Byzantine Fault Tolerant LDAP System

    Publication Year: 2006, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    LDAP is a set of protocols for accessing information directories which provides data integrity and authentication. It takes attacks on clients, Internet and benign attacks on servers into account. But the malicious attacks on servers and software errors are rarely involved. In this paper, a secure aware Byzantine fault tolerant LDAP system is proposed, which can tolerate malicious faults occurred ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designated Verifier Proxy Signature Scheme from Bilinear Pairings

    Publication Year: 2006, Page(s):40 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    A proxy signature enables an original signer to delegate her signing capability to a proxy signer and the proxy signer can sign a message on behalf of the original signer. Later, anyone accessible to the public keys of the original signer and proxy signer and the corresponding delegation warrant is able to verify the authenticity of a purported proxy signature. Obviously, the "public-verifiable" p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proxy-Protected Signature Scheme Based on Finite Automaton

    Publication Year: 2006, Page(s):48 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    In this paper, based on finite automaton, we would like to propose a new proxy-protected signature scheme. First we modified the signature scheme of FAPKC4, and then used it to construct a new proxy-protected signature scheme. It is the first one constructed from finite automaton, and we analyzed the scheme's security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Model for Detecting Application Layer DDoS Attacks

    Publication Year: 2006, Page(s):56 - 63
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Countering distributed denial of service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. DDoS attacks are typically carried out at the network layer. However, there is evidence to suggest that application layer DDoS attacks can be more effective than the traditional ones. In this paper, we consider sophisticated attacks t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource Efficient Hardware Design for RSA

    Publication Year: 2006, Page(s):64 - 68
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    RSA is a strong public-key cryptosystem, which is generally used for authentication protocols. In this paper, we propose a resource efficient design for RSA based on a new architecture whose complexity in resource but memory grows little with the security level of RSA. Furthermore, we optimize the Montgomery modular multiplication algorithm in high-radix by avoiding the final comparison and implem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Hierarchical Fragile Watermarking Method with Tamper Localization

    Publication Year: 2006, Page(s):69 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, we proposed a scheme that not only thwarts all kinds of attacks such as vector quantization (VQ) and oracle attack in order to satisfy the security but also ensures superior accuracy of tamper localization. It is effective because the detection is based on a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy

    Publication Year: 2006, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    An ad hoc network is a multi-hop wireless network of mobile nodes without fixed infrastructure. We have proposed PoolODMRP to adapt limited bandwidth and frequently changing topology of ad hoc network. However, PoolODMRP does not make full use of its multiple paths by distributing its data load over these paths. Therefore, in this paper, we propose MPoolODMRP (Multipath PoolODMRP) to extend PoolOD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient ID-Based Multi-proxy Multi-Signature Scheme

    Publication Year: 2006, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    In this paper, we propose a new efficient identity based proxy signature scheme. Compared with the previously proposed proxy signature schemes, ours combines the properties of proxy signature and the identity based signature, and has much more advantages than the traditional proxy signature schemes without the identity based characteristic. In addition, we also modify the general scheme into an ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group Oriented Deniable Authentication Protocol

    Publication Year: 2006, Page(s):89 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Deniable authenticated protocol is a new cryptographic authentication protocol that enables an intended receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Therefore, it can be applied to many practical situations. Over the past years, plenty of deniable authentication protocols have been put forth. In this paper, based on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Grid Portal Using PKI and Online Proxy Certificate Repository

    Publication Year: 2006, Page(s):93 - 96
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    With the development of grid service, there are two key problems to be improved. One is to access Web grid service with friend interface for user. Another is the security authentication for grid resource share. Nowadays, a solution of Web universal entrance for grid service has been given through a Web framework named grid portal. PKI based grid security infrastructure has been widely used in orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ERAS - an Emergency Response Algorithm for Survivability of Critical Services

    Publication Year: 2006, Page(s):97 - 100
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    Survivability has emerged as a new phase for the development of network security technique, and how to improve the system survivability using effective technique is an important problem. This paper takes the requirement of emergency response as its research background, and a new algorithm is proposed based on resource reconfiguration. The algorithm focuses on the time of emergency response and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm of Topology Discovery in Large Multi-Subnet Physical Network

    Publication Year: 2006, Page(s):101 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    In this paper, a novel algorithm for automatic topology discovery of large-scale multi-subnet physical networks was proposed, this algorithm used information reachable-address and port's traffic statistics information as constraints, based on skeleton initialization, refinement and stitching. Practically, this algorithm can accurately discovery the complete topology of a large-scale multi-subnet p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Identification System Combined with Fingerprint and Cryptography

    Publication Year: 2006, Page(s):105 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    In this paper, a design schema of a security authentication system combined with fingerprint identification and public key cryptography is explored, and its specific security mechanism is discussed in detail. In our schema, fingerprint is added into user's private key and served as a security parameter, such that user's secret key is separated into secret key parameters and fingerprint, by secret ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.