Scheduled Maintenance on May 23rd, 2017:
IEEE Xplore will undergo an upgrade from 1:00 - 4:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

2011 Third International Conference on Communications and Mobile Computing

18-20 April 2011

Filter Results

Displaying Results 1 - 25 of 137
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (149 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2011, Page(s):xviii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Keynote and Plenary Speakers

    Publication Year: 2011, Page(s):xxv - xxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Policy of WLAN Data Transmission Based on Logistic Chaotic Modulation

    Publication Year: 2011, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Analyzing on WEP (Wired Equivalent Privacy) indicates many defects existing in security. A security policy of WLAN data transmission based on logistic chaotic modulation is presented. The improved Logistic mapping can carry information in the WLAN data frame through the change of single parameter μ, which can lead to morphological changes of chaotic attractors. The receiver decision device ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • B-IRP: An Improving Integrity Report Protocol for Remote Attestation

    Publication Year: 2011, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation requirement frequently, the massive delay is inevitable. Without the modification to TPM, we propose Batch Integrity Report Protocol (BIRP) to overcome the performance bottleneck. B-IRP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Taint Analysis with Taint Behavior Summary

    Publication Year: 2011, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Software security has drawn much attention recently. As an effective approach to detect software vulnerabilities and improve software security, dynamic taint analysis has been frequently researched in the last few years. In this paper, we implement a dynamic taint tracking system LTTS. In order to address the efficiency problem which exists in many of the current taint tracking systems, we also pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Speed Architecture Design and Implementation for SMS4-GCM

    Publication Year: 2011, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    A new and high-efficiency encryption and authentication algorithm, SMS4-GCM, based on cryptographic algorithm SMS4 and block cipher operating mode GCM is proposed. Design using full pipeline architecture and implementation on FPGA are presented in detail, and the results show that the maximal processing rate of SMS4-GCM can reach up to 22.248 Gbps which can meet the demands of high-speed network's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Observation and Analysis on Spam Sending Behavior

    Publication Year: 2011, Page(s):19 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Due to Internet, people prefer using emails instead of traditional post mails, because of its simple and easy to use. Meanwhile unsolicited emails (spam) become a serious problem, as sending bulk emails are almost cost free in terms of time and money. Spam not only reduces system performance of mail servers but also annoys mail receivers. Nowadays attacks from Internet usually have strong links wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal Ordered Image Encryption

    Publication Year: 2011, Page(s):23 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    The existing image encryption algorithms encrypt images independently, which means the probability of an eavesdropper working out one image stays the same under the same circumstances (same bits of keys and the same algorithm, for example). However, in real-life applications such as communication systems, on one hand, sequences of images may need to be sent with various security demands, and on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Power of Refresh: A Novel Mechanism for Securing Low Entropy PII

    Publication Year: 2011, Page(s):29 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Deterministic encryption for low entropy personally identifiable information(PII) is vulnerable to dictionary attack. It is particularly so because of an expedient method to enumerate possible PII'splain text instead of all possible keys. Deterministic encryption, however, is indispensable in the generation of hash or index of PII. This paper presents a novel mechanism to frustrate dictionary atta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practicality Analysis of the Self-Healing Group Key Distribution Schemes for Resource-Constricted Wireless Sensor Networks

    Publication Year: 2011, Page(s):37 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    A number of self-healing group key distribution schemes have been proposed recently, however, though practicality analysis and simulation of the commonly used self-healing group key distribution schemes, we show that almost none of the existing schemes are suitable for large-scale and resource-constricted wireless sensor networks in real-world applications, and it is still an urgent requirement to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis and Optimization on M-commerce Secure Payment Model

    Publication Year: 2011, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    The M-Commerce has incomparable superiorities compared with traditional e-commerce. And at the same time, it has brought forward higher request of the security. The thesis analyzes the business model of M-Commerce secure payment, the SeMoPS model, and puts forward optimizing the business process of SeMoPS model combining the consideration of the security threats that M-Commerce has faced . In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Collaborative Network Security Management System in Metropolitan Area Network

    Publication Year: 2011, Page(s):45 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    Network Security Appliances are deployed at the vantage point of the Internet to detect security events and prevent attacks. However, these appliances are not so effective when it comes to distributed attacks such as DDoS. This paper presents a design and implementation of collaborative network security management system (CNSMS), which organize the NetSecu nodes into a hybrid P2P and hierarchy arc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Intrusion Detection System Using Class and Sample Weighted C-support Vector Machine

    Publication Year: 2011, Page(s):51 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Whenever an intrusion occurs, the security of a computer system is compromised. Presently there are a lot of algorithms applied in intrusion detection systems. The SVM is one of the most successful ones in the data mining area, but its biasing behavior with uneven datasets limits its use. Shu-Xin Du proposed an improved approach named weighted SVM to solve this problem. However, Weighted SVM consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Analysis of Trusted Computing: One Case Study

    Publication Year: 2011, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. With the support of changed LS2, we model three types of isolation. Moreover, we formally analyze the integrity measurement property of TrustVisor proposed recent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetSecu: A Collaborative Network Security Platform for In-network Security

    Publication Year: 2011, Page(s):59 - 64
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (982 KB) | HTML iconHTML

    Malicious attacks are frequently launched to make specified network service unavailable, compromising end hosts for political or business purpose. Though network security appliances are widely deployed to resist these attacks, there is a lack of dynamic and collaborative platform to flexibly configure and manage all the security elements. In this paper, we present NetSecu, a platform based on Java... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study

    Publication Year: 2011, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Access control is essential to computer security, especially in an open, distributed, networked communication environment. Modern access control model such as UCON aims at accommodating general requirements. Traditional one such as BLP focuses on specific properties, e.g. confidentiality. Both of these two realms have their limitations. Taking UCON and BLP as case study, this paper explores mutual... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution

    Publication Year: 2011, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    Content pollution problem has attracted broad attention due to its impacts on P2P networks' efficiency and availability. Especially for Bit Torrent users, unmanageable versions of BT torrents and chunk-based file sharing mode make it more difficult to avoid pollution dissemination. In our paper, we propose a smart version selection strategy based on taste buddies to help users select high-quality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.