By Topic

Computer and Communications Security, 2009. ICCCS '09. International Conference on

Date 5-6 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 51
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1013 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (336 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (1014 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (794 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Message from the ICCCS 2009 Chairs

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (483 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICCCS 2009 Organizing Committee

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (483 KB)
    Freely Available from IEEE
  • ICCCS 2009 Reviewers

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (484 KB)
    Freely Available from IEEE
  • Delay Tolerant Vehicular Network in Intelligent Transportation System

    Publication Year: 2009, Page(s):3 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    RFID enabled wireless sensor networks are attracting intensive interests of intelligent transportation applications. This paper proposes a dynamic infrastructure for vehicular communications built upon the RFID enabled delay tolerant wireless sensor networks named mobile relay network (MRN) for the communication in the intelligent transportation system. A group-sequence based routing protocol is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Realization of the Bank Self-service Terminal Based on XFS Standard

    Publication Year: 2009, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    This paper discusses adding a new logic processing module which is in line with the WOSA/XFS standard to the existing self-service terminal. In this module, the mapping relationship of the SP (service provider) and service call function have been realized because the use of reflection mechanisms, thereby ensuring that the application function has nothing to do with the hardware devices. All that h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Incremental Mining Algorithm Based on Risk Analysis of the Association Rules for Bank Cost Analysis

    Publication Year: 2009, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    This paper introduces improving rate and proposes the incremental mining algorithm with the weighted model for optimizing association rules based on CBA mining algorithm. The risk analysis of the strong association rules is proposed for trend forecasting. And the risk degree of the lost rules based on the incremental mining is also analyzed. Comparing with the traditional algorithm, the improved a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Anomaly Detection Algorithm

    Publication Year: 2009, Page(s):14 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    A novel anomaly detection algorithm is proposed and based on the danger model. The danger model is built on a sensitive tissue (ST) which consists of a population of sensitive cells (SCs) that are abstracted from computer system, and such cells are very sensitive to cellular damages. ST plays a role as an interface between problems and immune cells for danger recognition and estimation. This novel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-photorealistic Rendering for 3D Mesh Models

    Publication Year: 2009, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Non-photorealistic rendering (NPR) for 3D mesh models has made considerable progress in recent years and it has become a hot topic in computer graphics and other related fields. This paper presents an overview of the key techniques in non-photorealistic rendering for 3D mesh models, such as line drawings based on geometric and visual features, the surface brightness and stylized shadow setting. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Intrusion Detection Based on Support Vector Machine

    Publication Year: 2009, Page(s):21 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves the aim that SVM can accurately predict the abnormal state of system. By the use of this method, the limitation of traditional machine learning me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Intrusion Detection Model Based on Clustering Analysis

    Publication Year: 2009, Page(s):24 - 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Through the research and analysis of the intrusion detection techniques and data mining, this paper presents a intrusion detection model which is based on cluster analysis K-means algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic Seal Based on Hash Function and Digital Watermark

    Publication Year: 2009, Page(s):28 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    To address the defect of the simplex digital signature in e-commerce and e-government, the paper presents a method of electronic seal based on the digital watermark technology. The method combines one-way hash function and digital watermarking, implements the tamper-proofing of electronic documents, anti-copy of e-seal and secure access control function, can effectively to meet the basic needs of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Congestion Control in Networks Based on Chaos Theory

    Publication Year: 2009, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    This paper describes the reasons of congestion in networks and the typical congestion control strategy briefly first, and then study on chaos characteristics of the Internet traffic and discussion on causes. And then put forth a network congestion control strategy based on chaos theory which promises to open new avenues to network congestion control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD

    Publication Year: 2009, Page(s):36 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    In this paper, we introduce a robust image watermarking method based on bi-dimensional empirical mode decomposition (BEMD) against geometric distortion. Based on the characteristics of the image theory and human visual system, the proposed method makes use of orthogonal properties of empirical mode decomposition to achieve the BEMD transform on the image. The image is decomposed into a series of I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Nonsingularity on the Symmetric r-Circulant Matrices

    Publication Year: 2009, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Circulant matrix is important since it is an active research field of applied mathematic and computation mathematic increasingly. R-circulant matrices have applied in numerical computation, signal processing, coding theory and oil investigation in recent years, and so on. In this paper, motivated by Zhaolin Jiang (1995), we give some discriminations by using only the elements in the first row of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Improved Ant Colony Algorithm in Integrated Circuit Routing

    Publication Year: 2009, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    As VLSI fabrication technology developing to VDSM and the magnitude increasing rapidly¿a more effective optimized algorithm is requited to realize circuit routing in the physical design. In this paper, through optimizing the basic ant colony algorithm based on ant colony system, a better solution is found. It can improve the problem of excessive search time using the basic ant colony to solve tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimization Method for Power/Ground Network Based on Genetic Algorithm

    Publication Year: 2009, Page(s):48 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    An optimization method for power/ground network based on genetic algorithm was presented in this paper. The method could deal with the problem from the VLSI placement stage combined with the characteristic of the power/ground network. It had optimized the power/ground network floor planning by the improvement of the placement of the modules. The simulation proved that the anticipant result was ach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient and Secure Protocol for Low-cost RFID Systems

    Publication Year: 2009, Page(s):51 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Radio frequency identification (RFID) technology is as an automated identification technology and has become pervasive in our lives. However, RFID systems are known vulnerable to counterfeiting and clandestine tracking. The traditional cryptographic operations are too costly to be used for low-cost RFID tag. In this paper, we present an efficient and secure protocol. Our protocol is secure against... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies

    Publication Year: 2009, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Image Encryption and Steganography Scheme

    Publication Year: 2009, Page(s):60 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    With the development of network technique, the research of information security technique is becoming more and more important. In this paper, we proposed a new image encryption and steganography scheme. First, the secret message is encrypted through the combination of a new gray value substitution operation and position permutation which makes the encryption system strong. And then the processed s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Maximal Length Nonlinear Pseudorandom Sequence

    Publication Year: 2009, Page(s):64 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Pseudorandom Sequences have been widely used in many areas such as telecommunication, cryptology, navigation and radar. m-sequence is one of desirable pseudorandom sequences. By utilizing the feedback functions of m-Sequences, a new method of constructing the feedback function of the nonlinear maximal length shift registers is presented. The feedback function is constructed by using of both the ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.