By Topic

Computer and Communications Security, 2009. ICCCS '09. International Conference on

Date 5-6 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 51
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1013 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (336 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (1014 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (794 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (142 KB)  
    Freely Available from IEEE
  • Message from the ICCCS 2009 Chairs

    Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (483 KB)  
    Freely Available from IEEE
  • ICCCS 2009 Organizing Committee

    Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (483 KB)  
    Freely Available from IEEE
  • ICCCS 2009 Reviewers

    Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (484 KB)  
    Freely Available from IEEE
  • Delay Tolerant Vehicular Network in Intelligent Transportation System

    Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (556 KB) |  | HTML iconHTML  

    RFID enabled wireless sensor networks are attracting intensive interests of intelligent transportation applications. This paper proposes a dynamic infrastructure for vehicular communications built upon the RFID enabled delay tolerant wireless sensor networks named mobile relay network (MRN) for the communication in the intelligent transportation system. A group-sequence based routing protocol is developed to support the MRN. Based on the MRN, the Ubiquitous Intelligence for Data Query (UIDQ) service platform is proposed to provide information access, relay, search and delivery among the drivers on the move. The computing results validate the UIDQ scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Realization of the Bank Self-service Terminal Based on XFS Standard

    Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    This paper discusses adding a new logic processing module which is in line with the WOSA/XFS standard to the existing self-service terminal. In this module, the mapping relationship of the SP (service provider) and service call function have been realized because the use of reflection mechanisms, thereby ensuring that the application function has nothing to do with the hardware devices. All that have effectively raise the scalability and manageability of the self-service system to expand, delete and update. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Incremental Mining Algorithm Based on Risk Analysis of the Association Rules for Bank Cost Analysis

    Page(s): 10 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (236 KB) |  | HTML iconHTML  

    This paper introduces improving rate and proposes the incremental mining algorithm with the weighted model for optimizing association rules based on CBA mining algorithm. The risk analysis of the strong association rules is proposed for trend forecasting. And the risk degree of the lost rules based on the incremental mining is also analyzed. Comparing with the traditional algorithm, the improved algorithm is fast, efficient in incremental data mining and can find trends in association rules. The decision making reliability is enhanced by the association rules obtained from the improved algorithm. The algorithm was used in bank cost analysis with test results showing that the prediction precision of the algorithm is better than that of the traditional algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Anomaly Detection Algorithm

    Page(s): 14 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    A novel anomaly detection algorithm is proposed and based on the danger model. The danger model is built on a sensitive tissue (ST) which consists of a population of sensitive cells (SCs) that are abstracted from computer system, and such cells are very sensitive to cellular damages. ST plays a role as an interface between problems and immune cells for danger recognition and estimation. This novel anomaly detection algorithm is different from the existing ones for the introduction to a novel component-sensitive tissue in the danger model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-photorealistic Rendering for 3D Mesh Models

    Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (518 KB) |  | HTML iconHTML  

    Non-photorealistic rendering (NPR) for 3D mesh models has made considerable progress in recent years and it has become a hot topic in computer graphics and other related fields. This paper presents an overview of the key techniques in non-photorealistic rendering for 3D mesh models, such as line drawings based on geometric and visual features, the surface brightness and stylized shadow setting. We introduce popular methods dealing with these problems and point out the characteristics of these methods and their deficiencies. Discussion is given and future work is addressed at the end of the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Intrusion Detection Based on Support Vector Machine

    Page(s): 21 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves the aim that SVM can accurately predict the abnormal state of system. By the use of this method, the limitation of traditional machine learning method is avoided and ensures the stronger extension ability which makes intrusion detection system to have the better detecting performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Intrusion Detection Model Based on Clustering Analysis

    Page(s): 24 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (251 KB) |  | HTML iconHTML  

    Through the research and analysis of the intrusion detection techniques and data mining, this paper presents a intrusion detection model which is based on cluster analysis K-means algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic Seal Based on Hash Function and Digital Watermark

    Page(s): 28 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    To address the defect of the simplex digital signature in e-commerce and e-government, the paper presents a method of electronic seal based on the digital watermark technology. The method combines one-way hash function and digital watermarking, implements the tamper-proofing of electronic documents, anti-copy of e-seal and secure access control function, can effectively to meet the basic needs of electronic document and security requirements. This paper shows experimental results and the future direction of development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Congestion Control in Networks Based on Chaos Theory

    Page(s): 32 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    This paper describes the reasons of congestion in networks and the typical congestion control strategy briefly first, and then study on chaos characteristics of the Internet traffic and discussion on causes. And then put forth a network congestion control strategy based on chaos theory which promises to open new avenues to network congestion control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD

    Page(s): 36 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (507 KB) |  | HTML iconHTML  

    In this paper, we introduce a robust image watermarking method based on bi-dimensional empirical mode decomposition (BEMD) against geometric distortion. Based on the characteristics of the image theory and human visual system, the proposed method makes use of orthogonal properties of empirical mode decomposition to achieve the BEMD transform on the image. The image is decomposed into a series of IMFs and residue which contain the different frequency parts of the image. So the watermark is adaptively weighed to the different positions of the middle frequency IMF region. The method makes use of the multi-scale analysis characteristics of image BEMD theory and the person's sense of vision and shows excellent advantage against shearing attack. The method could show the watermark clearly when half of the image has been cut. Experimental results show this method excellent robustness for image shearing. The watermark thus generated is invisible and performs well in StirMark test and is robust to geometrical attacks. Compared with other watermarking algorithms, this algorithm is more robust, especially against geometric distortion, while having excellent frequency properties. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Nonsingularity on the Symmetric r-Circulant Matrices

    Page(s): 40 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Circulant matrix is important since it is an active research field of applied mathematic and computation mathematic increasingly. R-circulant matrices have applied in numerical computation, signal processing, coding theory and oil investigation in recent years, and so on. In this paper, motivated by Zhaolin Jiang (1995), we give some discriminations by using only the elements in the first row of the r-circulant matrix in the diagonal matrix on non singularity, and give two examples at last. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Improved Ant Colony Algorithm in Integrated Circuit Routing

    Page(s): 44 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (575 KB) |  | HTML iconHTML  

    As VLSI fabrication technology developing to VDSM and the magnitude increasing rapidly¿a more effective optimized algorithm is requited to realize circuit routing in the physical design. In this paper, through optimizing the basic ant colony algorithm based on ant colony system, a better solution is found. It can improve the problem of excessive search time using the basic ant colony to solve traveling salesman problem (TSP). The improved algorithm has fast convergence capability and strong optimization ability. Using the improved ant colony algorithm to solve the multiterminal net routing problem around the obstacles, a better total connection length is achieved. The experimental results show that the improved ant colony algorithm is an effective way to solve difficult NP wire problems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimization Method for Power/Ground Network Based on Genetic Algorithm

    Page(s): 48 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (234 KB) |  | HTML iconHTML  

    An optimization method for power/ground network based on genetic algorithm was presented in this paper. The method could deal with the problem from the VLSI placement stage combined with the characteristic of the power/ground network. It had optimized the power/ground network floor planning by the improvement of the placement of the modules. The simulation proved that the anticipant result was achieved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient and Secure Protocol for Low-cost RFID Systems

    Page(s): 51 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (279 KB) |  | HTML iconHTML  

    Radio frequency identification (RFID) technology is as an automated identification technology and has become pervasive in our lives. However, RFID systems are known vulnerable to counterfeiting and clandestine tracking. The traditional cryptographic operations are too costly to be used for low-cost RFID tag. In this paper, we present an efficient and secure protocol. Our protocol is secure against counterfeiting by means of a shared secret key between each tag and the backend database, and is secure against tracking through changing the tag's response each time to queries. The protocol can also resist the desynchronization attack. This protocol only demands hardware support of a pseudo-random number generation (PRNG) and a cyclic redundancy check (CRC) to achieve high security, which makes the protocol easy to implement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies

    Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors' weights for DRM security policies were proposed based on fuzzy analytic hierarchy process, and then swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Image Encryption and Steganography Scheme

    Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (453 KB) |  | HTML iconHTML  

    With the development of network technique, the research of information security technique is becoming more and more important. In this paper, we proposed a new image encryption and steganography scheme. First, the secret message is encrypted through the combination of a new gray value substitution operation and position permutation which makes the encryption system strong. And then the processed secret message is hidden in the cover image to fulfill steganography. Experimental results show that the scheme proposed in this paper has a high security level and better image stego-image quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Maximal Length Nonlinear Pseudorandom Sequence

    Page(s): 64 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB) |  | HTML iconHTML  

    Pseudorandom Sequences have been widely used in many areas such as telecommunication, cryptology, navigation and radar. m-sequence is one of desirable pseudorandom sequences. By utilizing the feedback functions of m-Sequences, a new method of constructing the feedback function of the nonlinear maximal length shift registers is presented. The feedback function is constructed by using of both the characteristic function and feedback functions from m-Sequences. Through the feedback functions, the nonlinear maximal length pseudorandom sequences are realized on FPGA. Meanwhile, the corresponding analysis demonstrates that this type of sequence has the desirable pseudorandom characteristic. It's satisfactory and desirable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.