By Topic

Network and Parallel Computing, 2008. NPC 2008. IFIP International Conference on

Date 18-21 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 111
  • [Front cover]

    Publication Year: 2008 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (559 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • [Title page iv - Copyright notice]

    Publication Year: 2008 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (131 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2008 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the NSS 2008 Chairs

    Publication Year: 2008 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (112 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • NSS 2008 Program Committee

    Publication Year: 2008 , Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • Message from ATNCTA 20008 Chairs

    Publication Year: 2008 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (105 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • ATNCTA 2008 Program Committee

    Publication Year: 2008 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (103 KB)  
    Freely Available from IEEE
  • Message from HPN 20008 Chairs

    Publication Year: 2008 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • HPN 2008 Program Committee

    Publication Year: 2008 , Page(s): xix
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Message from DKM 2008 Chairs

    Publication Year: 2008 , Page(s): xx
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • DKM 2008 Program Committee

    Publication Year: 2008 , Page(s): xxi - xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • Message from CWUWNet 2008 Chairs

    Publication Year: 2008 , Page(s): xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (103 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • CWUWNet 2008 Program Committee

    Publication Year: 2008 , Page(s): xxiv
    Save to Project icon | Request Permissions | PDF file iconPDF (95 KB)  
    Freely Available from IEEE
  • Message from HPSECA 2008 Chairs

    Publication Year: 2008 , Page(s): xxv
    Save to Project icon | Request Permissions | PDF file iconPDF (106 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • HPSECA 2008 Program Committee

    Publication Year: 2008 , Page(s): xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (97 KB)  
    Freely Available from IEEE
  • A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks

    Publication Year: 2008 , Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (422 KB) |  | HTML iconHTML  

    As various applications of SIP-based VoIP networks have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we present a certificate-based two party authentication key agreement protocol for SIP-based VoIP networks and prove its security in the random oracle model. Additionally, our scheme could be used for multiple CAs enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem

    Publication Year: 2008 , Page(s): 11 - 17
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    Many emerging network applications are based upon group communication models and are implemented with multicast communications. We address the problem of distributing a secret session key to a secure multicast group. In a pair of such key management schemes, the session key is distributed mathematically based upon the Euler-Fermat theorem, such that upon receiving the broadcast keying material kno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conditional Privacy Using Re-encryption

    Publication Year: 2008 , Page(s): 18 - 25
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (271 KB) |  | HTML iconHTML  

    This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system. Firstly, a secure protocol to distribute a re-encryption key from a user A to a service provider B, with the help of n referees, is proposed. Next, this re-encryption key distribution protocol is combined with an existing private credential system to provide a protocol f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Outlier Detection to Reduce False Positives in Intrusion Detection

    Publication Year: 2008 , Page(s): 26 - 33
    Cited by:  Papers (1)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (542 KB) |  | HTML iconHTML  

    Intrusion detection systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e. alerts that are triggered incorrectly by benign events). This makes it extremely difficult for managers to analyze and react to attacks. This paper presents a novel method for handling IDS alerts more efficiently. It introduces outlier detection technique into this field, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity-Based On-Line/Off-Line Signcryption

    Publication Year: 2008 , Page(s): 34 - 41
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    We present an identity-based online/offline signcryption scheme, where most of computations are carried out when the message is not available (i.e., off-line stage) and the online part of our scheme does not require any exponent computations and therefore is very efficient. It combines the functionalities of signature and encryption and is provably secure in the random oracle model. We also show t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute Delegation Authorization Based on Subjective Trust Evaluation

    Publication Year: 2008 , Page(s): 42 - 49
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (330 KB)  

    Trust-based delegation authorization mechanism is regarded as an effective method for computational resource access in open dynamic environment. One important problem is how to apply more grain subjective trust control on delegation and authorization procedure. On this paper, the problem is probed and a trusted role based logic model on the semantic of attribution authorization mechanism is propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-core Supported Intrusion Detection System

    Publication Year: 2008 , Page(s): 50 - 55
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    Integrated multi-core processors with on-chip application acceleration have established themselves as the most efficient method of powering next-generation networking platforms. New research has been conducted for addressing the issues of multi-core supported network and system security. This paper put forward an asymmetrical multiprocessing architecture multi-core supported anomaly intrusion dete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.