2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

13-15 Oct. 2014

Filter Results

Displaying Results 1 - 25 of 96
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1965 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2014, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (152 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Steering Committee Chair

    Publication Year: 2014, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2014, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2014, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2014, Page(s):xvii - xix
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2014, Page(s):xx - xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A SDKEY-Based Secure Storage and Transmission Approach for Android Phone

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    To resolve the more and more serious problems of sensitive data leakage from Android systems, a kind of method of data protection on encryption storage and encryption transmission is presented in this paper by adopting secure computation environment of SDKEY device. Firstly, a dual-authentication scheme for login using SDKEY and PIN is designed. It is used for login on system boot and lock screen.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random Characteristics for LSR, RC4, and Logistic Stream Cipher

    Publication Year: 2014, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    LSR, RC4 and Logistic chaos ciphers are the representatives of the mostly used cipher. In this paper, we study the random characteristics and the generation of their sequences. In the setting of approximation condition, we performed 15 tests for their random performance by NIST software sts -- 2.1.1. Using these testing results, we analyze their random properties and indicate the application benef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking

    Publication Year: 2014, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its signature generation phase, however the improvements of the original one are all proved to be inefficient. In order to remedy the security flaws and improve the performance, a novel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network

    Publication Year: 2014, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    The Network Mobility (NEMO) Basic Support protocol enables support for network mobility for MIPv6 networks, and multihoming technology provides support for multiple mobile routers (MRs) in one mobile network. Due to the critical role in acting as a gateway, the MR is particular vulnerable to various internal and external attacks, even being penetrated and controlled. The mobile nodes (MNs) attachi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big Data

    Publication Year: 2014, Page(s):19 - 26
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    One of the biggest impediments that prevent the evolution of big data is the privacy of users. Many advanced researches are done within this topic and a lot of concepts had seen the light. One is a cryptographic concept known as homomorphic encryption which allows the application of operations on ciphered data without need to decipher it. However, from the cryptographic aspect, the homomorphic enc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking

    Publication Year: 2014, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its signature generation phase, however the improvements of the original one are all proved to be inefficient. In order to remedy the security flaws and improve the performance, a novel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Intrusion Response System Algorithm with Danger Theory

    Publication Year: 2014, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Intrusion response is a new generation of technology basing on active defence idea, which has very prominent significance on the protection of network security. However, the existing automatic intrusion response systems are difficult to judge the real "danger" of invasion or attack. In this study, an immune-inspired adaptive automated intrusion response system model, named as AIAIM, was given. Wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exponential Optimal Synchronization of Chaotic Cryptosystems: Neural-Network-Based Approach

    Publication Year: 2014, Page(s):35 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    This paper presents a systematic design methodology for neural-network (NN) based secure communications in multiple time-delay chaotic (MTDC) systems with optimal H∞performance and cryptography. First, we use the n-shift cipher and key to the original message of transmission for encryption. The encrypted message is re-encrypted by using chaotic synchronization. A robust model-based fuzz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heuristic Method of Attack Graph Analysis for Network Security Hardening

    Publication Year: 2014, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    Traditional vulnerability scan tools cannot show the associations among vulnerabilities, and thus the security administrators have the difficulty to comprehensively understand the risks in networks according to the vulnerabilities sources. With the number of vulnerabilities growing rapidly, repairing all vulnerabilities costs much. In order to mitigate this problem, we propose a method using attac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shell-Based Block Ciphering Structure (SBCS) for AES Parallelism with Feedback-Data Mode

    Publication Year: 2014, Page(s):48 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB) | HTML iconHTML

    It is generally agreed that multiple hardware resources increase computing speed as each core provides individual data output. The provision of individual data output enables multiple cores to process and output data from each core independently. The individual characteristics of multiple hardware resources enhances data ciphering speed and outputs individual streams of cipher text. After encipher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Positive Selection-Inspired Anomaly Detection Model with Artificial Immune

    Publication Year: 2014, Page(s):56 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Network anomaly detection has become the promising aspect of intrusion detection. The existing anomaly detection models depict the detection profiles with a static way, which lack good adaptability and interoperability. Furthermore, the detection rate is low, so they are difficult to implement the real-time detection under the high-speed network environment. In this paper, the excellent mechanisms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions

    Publication Year: 2014, Page(s):60 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Money laundering refers to disguise or conceal the source and nature of variety ill-gotten gains, to make it legalization. In this paper, we design and implement the anti-money laundering regulatory application system (AMLRAS), which can not only automate sorting and counting the money laundering cases in comprehension and details, but also collect, analyses and count the large cash transactions. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative

    Publication Year: 2014, Page(s):66 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Security questions are often based on personal information that is limited in variety, available in the public record and very difficult to change if compromised. A personalized folktale shared only by the communicating parties provides memorizable basis for individualized security questions that can be readily replaced in the event of a security breach. We utilize the Propp theory of narrative to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code

    Publication Year: 2014, Page(s):73 - 78
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    The security of radio frequency identification (RFID) has become an increasingly severe issue. We propose a mutual RFID authentication secure protocol, based on the QC-MDPC McEliece type public cryptography in order to protect the information interaction security in wireless channel of RFID system. It owns low storage of public key, perfect efficiency of encryption and decryption, and high securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.