By Topic

Computers and Communications (ISCC), 2010 IEEE Symposium on

Date 22-25 June 2010

Filter Results

Displaying Results 1 - 25 of 228
  • About The ISSCC

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (554 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 10
    Request permission for commercial reuse | PDF file iconPDF (12566 KB)
    Freely Available from IEEE
  • Root

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (534 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (1341 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2010, Page(s):1 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1880 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Welcome messages

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (488 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizers at a glance

    Publication Year: 2010, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (2245 KB)
    Freely Available from IEEE
  • Technical program May 26

    Publication Year: 2010, Page(s):1 - 23
    Request permission for commercial reuse | PDF file iconPDF (2685 KB)
    Freely Available from IEEE
  • Patronage

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (378 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (222 KB)
    Freely Available from IEEE
  • Supporters

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (275 KB)
    Freely Available from IEEE
  • Modeling emergency events to evaluate the performance of time-critical WSNs

    Publication Year: 2010, Page(s):222 - 228
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Wireless sensor networks designed for critical tasks must be able to offer near real-time feedback about emergency events, allowing to supervise these events with a reasonable degree of accuracy within strict delay bounds. Achieving such high responsiveness in a distributed environment requires several improvements to currently available WSN protocols and technologies at different layers; such enh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-based MAC protocol for medical wireless body area sensor networks

    Publication Year: 2010, Page(s):216 - 221
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (927 KB) | HTML iconHTML

    In this paper, a random access protocol for quality of service (QoS) support targeted for medical wireless body area sensor networks (WBASNs) is proposed. In this proposal, the sensor nodes are classified into nodes of life-critical health information, and nodes of non-critical health information. The proposed QoS-based MAC protocol prioritizes the critical packets access to the transmission mediu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental hash tree for disk authentication

    Publication Year: 2010, Page(s):213 - 215
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Hash tree is a secure way to authenticate stored data. However, it is difficult to maintain a consistent state between the authentication result and data, which is necessary for permanent data storage of disk. Incremental node updating is proposed to solve such problem, it synchronizes data modification and authentication result with low cost. The reason is that the path from leaf node to root nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segment Level Authentication: Combating internet source spoofing

    Publication Year: 2010, Page(s):209 - 212
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    This paper presents SLA (Segment Level Authentication), a transport segment level solution designed to prevent both of the intra-domain and inter-domain source spoofing. SLA is based on public key cryptography authentication. It enables intermediate network nodes the ability to validate the packet authenticity by verifying authentication information carried in packets. Although public key cryptogr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AspFuzz: A state-aware protocol fuzzer based on application-layer protocols

    Publication Year: 2010, Page(s):202 - 208
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    In the face of constant malicious attacks to network-connected software systems, software vulnerabilities need to be discovered early in the development phase. In this paper, we present AspFuzz, a state-aware protocol fuzzer based on the specifications of application-layer protocols. AspFuzz automatically generates anomalous messages that exploit possible vulnerabilities. The key observation behin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation

    Publication Year: 2010, Page(s):196 - 201
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (885 KB) | HTML iconHTML

    This paper proposes a set of mechanisms for enhancing the security of the generalized MDC-2 mode of operation. The MDC-2 [4] mode is used for constructing a double length hash function, using block cipher building blocks, and is believed to provide some collision resistance [4], [10]. Recently, several attacks on MDC-2 have been published - collision, first and second pre-image attacks, with compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QTL: An efficient scheduling policy for 10Gbps network intrusion detection system

    Publication Year: 2010, Page(s):190 - 195
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Broad network bandwidth and deep inspection impose great challenge for the capability of 10Gpbs network security monitoring. Proper scheduling policies can improve system capability without requiring additional resources. LAS, a size-based scheduling policy which can achieve optimal mean response time by giving preferential analysis to short flows, is widely used in various aspects of network fiel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relation of PPAtMP and scalar product protocol and their applications

    Publication Year: 2010, Page(s):184 - 189
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Scalar product protocol and privacy preserving add to multiply protocol (PPAtMP) are two significant basic secure multiparty computation protocols. In this paper, we claim that the two protocols are equivalent to each other and we can achieve one based on the other with the same communication and computation complexity. Then, we propose Secure Two-party Mean Protocol, Secure Shared x ln x Protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for distributed provisioning availability-guaranteed least-cost lightpaths in WDM mesh networks

    Publication Year: 2010, Page(s):180 - 183
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    The trend in the development of intelligent optical networks is the move towards a unified solution, to support voice, data, and various services. Nowadays, different applications may need different levels of protection and differ in how much they are willing to pay for the service they get. A control scheme which is used to set up and tear down lightpaths, should not only be fast and efficient, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UANM: a platform for experimenting with available bandwidth estimation tools

    Publication Year: 2010, Page(s):174 - 179
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    In the field of network monitoring and measurement, the efficiency and accuracy of the adopted tools is strongly dependent on (i) structural and dynamic characteristics of the network scenario under measure and (ii) on manual fine tuning of the involved parameters. This is, for example, the case of the end-to-end available bandwidth estimation, in which the constraints of the measurement stage var... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-based connectivity over multi-virtual Wireless Mesh Networks: Analytical study

    Publication Year: 2010, Page(s):168 - 174
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    The flexibility and self-organization properties of Wireless Mesh Networks (WMNs), and the benefits arising from the split of a physical network in several context-aware Virtual Networks (VNs), are a two-fold force to deal with the huge heterogeneity of user requirements and network resources in a future Internet architecture. In this scope, we provide a novel context-aware architecture for WMNs, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quick end-to-end available bandwidth estimation for QoS of real-time multimedia communication

    Publication Year: 2010, Page(s):162 - 167
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    We propose PathQuick, a quick end-to-end available bandwidth estimation method. When PathQuick is used in real-time multimedia communication, such as real-time photo sharing and video conferencing, just before the transmission of media data such as photo and video, it can quickly complete the estimation of the latest available bandwidth. Consequently, the bandwidth consumption of media data can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cause and countermeasure of overtermination for PCN-based flow termination

    Publication Year: 2010, Page(s):155 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    Pre-congestion notification (PCN) is a packet marking mechanism for DiffServ domains to facilitate feedback-based admission control (AC) and flow termination (FT) for the Internet to achieve quality of service (QoS) for inelastic flows. While AC blocks new flows to prevent an overly high load on network links, FT removes traffic to protect the QoS of the remaining PCN-flows when traffic is reroute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive MIMO LS estimation technique via MSE criterion over a Markov channel model

    Publication Year: 2010, Page(s):151 - 154
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    This paper presents a classical MIMO transmission with pilot aided sequences based on adaptive LS channel estimation in a correlated time varying. The complexity reduction in performance is obtained for the various forgetting factors derived through the simulation. It is realized that, as long as the correlation of the channel parameters at different time indexes exceeds, the value of forgetting f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.