2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing

17-20 Dec. 2008

Go

Filter Results

Displaying Results 1 - 25 of 129
  • [Front cover - Vol 2]

    Publication Year: 2008, Page(s): C1
    Request permission for reuse | PDF file iconPDF (539 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2008, Page(s): i
    Request permission for reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2008, Page(s): iii
    Request permission for reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2008, Page(s): iv
    Request permission for reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2008, Page(s):v - xiii
    Request permission for reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the TSP-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xv
    Request permission for reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the EUV-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the SECUBIQ-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xvii
    Request permission for reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the ESO-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (115 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the NCUS-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xix
    Request permission for reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the TRUST-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xx
    Request permission for reuse | PDF file iconPDF (115 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the UUWSN-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xxi
    Request permission for reuse | PDF file iconPDF (104 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the UWMN-08 Workshop Co-Chairs

    Publication Year: 2008, Page(s): xxii
    Request permission for reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop Executive and Program Committees

    Publication Year: 2008, Page(s):xxiii - xxxvi
    Request permission for reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):3 - 9
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    In existing clustering algorithms in mobile ad hoc networks, some of them consider only stability of cluster heads, and some others take only security into account, while only a few of them consider both factors. We propose Voting-based Clustering Algorithm with subjective trust and stability (VCA) by accessing subjective trust of node through Bayesian method and by evaluating stability of node th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks

    Publication Year: 2008, Page(s):10 - 15
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Security and privacy of wireless sensor networks are key research issues recently. Most existing researches regarding wireless sensor network security consider homogenous sensor networks. To achieve better security and performance, we adopt a heterogeneous wireless sensor network (HWSN) model that consists of physically different types of sensor nodes. This paper presents a secure message distribu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sanitizing Signature Scheme with Indexing

    Publication Year: 2008, Page(s):16 - 21
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1114 KB) | HTML iconHTML

    A sanitizing signature scheme, which is a variant of digital signatures, enables a trusted party named sanitizer to modify parts of signed documents without corresponding to the signer. A lot of sanitizing signature schemes have been proposed since 2001. However these schemes are suitable for table-style documents, but none of them are considered for story-style documents. We consider that the sol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Detection Schemes for CED in Block Ciphers

    Publication Year: 2008, Page(s):22 - 27
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Concurrent Error Detection (CED) techniques based on hardware duplication are widely used to enhance system dependability. All CED techniques contain some form of redundancy. In this paper we present simulation results to quantitatively compare various CED schemes based on their area overhead and protection (data integrity) they provide against multiple failures. We describe some studies of parity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Impact-Oriented Metric for Interference to Network Routing

    Publication Year: 2008, Page(s):28 - 33
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    The measurement of interference intensity is critical to design of network architecture and routing protocol. However, most existing metrics for interference to network routing are based on concrete attack behaviors and error generations, which have restricted their applicable range. In this paper, an impact-oriented metric is proposed for the measurement of interference to network routing. As to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Directed Privacy Protection in the Ubiquitous Environment

    Publication Year: 2008, Page(s):37 - 42
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (611 KB) | HTML iconHTML

    In the ubiquitous environment, when a user obtains services from a domain and goes between domains, there is a need to move freely and have services provided continuously. Also, the service provider wants to authenticate a user easily. But a serious problem exists: How can a user's personal information be protected and how can a user control their information? In this paper, we propose a system to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably Secure Trusted Access Protocol for WLAN Mesh Networks

    Publication Year: 2008, Page(s):43 - 48
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and poli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Trustworthy and Secure Kiosk Computing for Mobile Users

    Publication Year: 2008, Page(s):49 - 54
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a userpsilas typical surrounding environment. Security is a concern when integrating a mobile device with an environment kiosk. In particula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Generation and Enforcement of Security Contract for Pervasive Application

    Publication Year: 2008, Page(s):55 - 60
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    Pervasive computing is providing its usability and scope in almost every aspect nowadays. In order to make better use of pervasive services in nomadic devices, pervasive client download might be needed, which would result in serious security problems due to executing untrusted applications. Recently Security-by-Contract has been proposed to address this problem, where an application is required to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Qualitative Risk Analysis for the GPRS Technology

    Publication Year: 2008, Page(s):61 - 68
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to security attacks that can compromise the network operation and the data transfer. We perform a detailed threat analysis by identifying the possible attacks that may result from the GPRS security weaknesses. The analyzed threats... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.