


default search action
EUC 2008: Shanghai, China
- Cheng-Zhong Xu, Minyi Guo:

2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops. IEEE Computer Society 2008
Workshop TSP-08, Session 1: Secure Schemes and Metrics
- Sancheng Peng, Weijia Jia

, Guojun Wang:
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. 3-9 - Yahui Li, Ding Yong, Jianfeng Ma:

Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. 10-15 - Atsushi Koide, Raylin Tso

, Eiji Okamoto:
A Sanitizing Signature Scheme with Indexing. 16-21 - Ewa Idzikowska, Krzysztof Bucholc:

Error Detection Schemes for CED in Block Ciphers. 22-27 - Song Huang, Lie-Gen Liu:

An Impact-Oriented Metric for Interference to Network Routing. 28-33
Workshop TSP-08, Session 2: Trust Management and Privacy Protection I
- Jae Hun Lee, Jin Kyu Park, Sang Wook Kim:

User-Directed Privacy Protection in the Ubiquitous Environment. 37-42 - Zhuo Ma, Jianfeng Ma, Yulong Shen:

Provably Secure Trusted Access Protocol for WLAN Mesh Networks. 43-48 - Dong Zhou, Hiroshi Inamura

:
Towards Trustworthy and Secure Kiosk Computing for Mobile Users. 49-54 - Ying Jin, Zepeng Li, Da Wei, Lei Liu:

Automatic Generation and Enforcement of Security Contract for Pervasive Application. 55-60 - Christos Xenakis

, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis
:
A Qualitative Risk Analysis for the GPRS Technology. 61-68
Workshop TSP-08, Session 3: Trust Management and Privacy Protection II
- Hongyan Mao, Yixiang Chen:

Research of a Multi-dimension Measurement Trusting Model Based on Markov Chain. 71-76 - Atsushi Koide, Raylin Tso

, Eiji Okamoto:
Convertible Undeniable Partially Blind Signature from Bilinear Pairings. 77-82 - Guanling Chen, Faruq Rahman:

Analyzing Privacy Designs of Mobile Social Networking Applications. 83-88 - Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang:

Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. 89-93 - Marion Blount, John Davis, Maria Ebling, William F. Jerome, Barry Leiba, Xuan Liu, Archan Misra

:
Privacy Engine for Context-Aware Enterprise Application Services. 94-100 - Peng Xiong, Wei Zhang:

The Trustworthiness Based on Hash Chain in Wireless Sensor Network. 101-106 - Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai:

Trust Similarity Measure in Trust Model for P2P Networks. 107-112
Workshop TSP-08, Session 4: Encryption and Decryption I
- Gaurav Kapoor, Wei Zhou

, Selwyn Piramuthu:
Distance Bounding Protocol for Multiple RFID Tag Authentication. 115-120 - Chien-Pen Chuang, Tin-Ying Huang, Li-Chi Yeh:

Encryption and Decryption with Space Transformation for Bi-directional Association. 121-126 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain:

Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. 127-132 - Daigo Muramatsu:

Online Signature Verification Algorithm Using Hill-Climbing Method. 133-138 - Huawei Zhao, Jing Qin

, Zhifeng Fang:
Converters for Designing Applied Cryptographic Protocols. 139-143 - Haojun Zhang, Xiaoxue Li, Rui Ren:

A Novel Self-Renewal Hash Chain and Its Implementation. 144-149
Workshop TSP-08, Session 5: Encryption and Decryption II
- Tae Youn Won, Ji Young Chun, Dong Hoon Lee:

Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. 153-158 - Pedro Peris-Lopez

, Tong-Lee Lim, Tieyan Li:
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework. 159-166 - Baokang Zhao, Dan Wang

, Zili Shao
, Jiannong Cao
, Keith C. C. Chan
, Jinshu Su
, Yanqin Yang:
Towards Successive Privacy Protection in Sensor Networks. 167-172 - Alan McCabe, Jarrod Trevathan

:
Markov Model-Based Handwritten Signature Verification. 173-179 - Yanfei Liu:

An Efficient RFID Authentication Protocol for Low-Cost Tags. 180-185 - Bhavani Thuraisingham, Pranav Parikh:

Trustworthy Semantic Web Technologies for Secure Knowledge Management. 186-193
Workshop TSP-08, Session 6: Key Management
- Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung:

An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. 197-201 - Yanjiang Yang, Feng Bao, Robert H. Deng

:
Efficient Client-to-Client Password Authenticated Key Exchange. 202-207 - Biming Tian, Song Han, Tharam S. Dillon:

A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. 208-215 - Ping Li, Jiaying Wu, Jingming Xue:

Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks. 216-221 - Reza Azarderakhsh, Arash Reyhani-Masoleh, Zine-Eddine Abid:

A Key Management Scheme for Cluster Based Wireless Sensor Networks. 222-227 - Yuan Xue, Helmut Jürgensen, Reza Azarderakhsh, Arash Reyhani-Masoleh:

Key Management for Wireless Sensor Networks Using Trusted Neighbors. 228-233 - Longjun Zhang, Tao Zou:

An Improved Key Management Scheme for WEP. 234-239
Workshop TSP-08, Session 7: Access Control and Anonymity
- Vincent C. Hu

, D. Richard Kuhn, Tao Xie:
Property Verification for Generic Access Control Models. 243-250 - Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang:

ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework. 251-256 - Minh-Triet Tran

, Trung Thanh Nguyen, Isao Echizen:
Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition. 257-263 - Yue Zhang, James B. D. Joshi:

Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. 264-271 - Xiaofeng Lu, Pan Hui, Pietro Liò, Zhang Xiong:

Identity Privacy Protection by Delayed Transmission in Pocket Switched Networks. 272-277 - Jun Li, Bruce Christianson

:
A Domain-Oriented Approach for Access Control in Pervasive Environments. 278-284 - José Bringel Filho, Hervé Martin:

Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments. 285-290
Workshop TSP-08, Session 8: Security and Privacy in Wireless Networks
- Apivadee Piyatumrong

, Pascal Bouvry
, Frédéric Guinand
, Kittichai Lavangnananda:
Trusted Spanning Tree for Delay Tolerant MANETs. 293-299 - Feilong Tang, Minyi Guo, Minglu Li, Zhijun Wang, Zixue Cheng:

Scalable and Secure Routing for Large-Scale Sensor Networks. 300-305 - Gicheol Wang, Deokjai Choi, Daewook Kang:

Securing Wireless Sensor Networks Using Cluster Reformations. 306-311 - Meng Ge, Kwok-Yan Lam, Jian-Bin Li, Siu Leung Chung:

Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. 312-317 - Wei Ren

, Yi Ren, Hui Zhang:
HybridS: A Scheme for Secure Distributed Data Storage in WSNs. 318-323 - Hyuncheol Kim, Jungha Paik, Bumhan Lee, Dong Hoon Lee:

SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment. 324-329
Workshop TSP-08, Session 9: Secure Services and Security Analysis
- Wenbin Luo, Gregory L. Heileman:

Exponential Hashing in Finite Fields. 333-338 - Chaowang Shang, Zongkai Yang, Qingtang Liu

, Chengling Zhao:
A Context Based Dynamic Access Control Model for Web Service. 339-343 - Chun-Chao Yeh:

Secure and Verifiable P2P Card Games. 344-349 - Xiang Fan, Yang Xiang

:
Defending against the Propagation of Active Worms. 350-355 - Joongman Kim, Seokung Yoon, Hyuncheol Jeong, Yoojae Won

:
Implementation and Evaluation of SIP-Based Secure VoIP Communication System. 356-360 - Nicolai Kuntze, Julian Schütte

:
Securing Decentralized Workflows in Ambient Environments. 361-366 - Yawen Wang, Yunzhan Gong, Junliang Chen, Qing Xiao, Zhaohong Yang:

An Application of Interval Analysis in Software Static Analysis. 367-372
Workshop EUV-08
- Deshi Ye, Qinming He, Hua Chen, Jianhua Che:

A Framework to Evaluate and Predict Performances in Virtual Machines Environment. 375-380 - Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang:

Performance Measuring and Comparing of Virtual Machine Monitors. 381-386 - Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang:

An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software Deployment. 387-392 - Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng:

Analysis and Enhancement for Interactive-Oriented Virtual Machine Scheduling. 393-398 - Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao:

DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture. 399-404 - Ran Zheng, Xiaofei Liao, Hai Jin:

A Novel Virtual Grid Experiment Method in MedImGrid. 405-410 - Kang Chen, Jun Xin, Weimin Zheng:

VirtualCluster: Customizing the Cluster Environment through Virtual Machines. 411-416 - Jiong Yu, Guozhong Tian, Ling Cheng:

Allocating Resource in Grid Workflow Based on State Prediction. 417-422 - Yanbin Peng, Bei Shui Liao, Ji Gao, Jun Hu, CunHao Wang, Jie-Qing Ai, Hang Guo:

Cooperative Problem Solving Process Based on MAS_NP Model. 423-427
Workshop SEQUBIQ-08
- Kazumasa Omote, Atsuko Miyaji

, Kazuhiko Kato:
Simple Certificateless Signature with Smart Cards. 431-436 - Jiang Han, Qiuliang Xu, Guohua Chen:

Efficient ID-based Threshold Ring Signature scheme. 437-442 - Raphael C.-W. Phan

, Bok-Min Goi
:
(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map. 443-446
Workshop ESO-08
- Shenglin Gui, Lei Luo, Qian Liu, Fulei Guo, Shaopeng Lu:

UCaS: A Schedulability Analysis Tool for AADL Models. 449-454 - Shan Ding, Zhiqiang Xie, Xiaona Yin:

A GA-based Systematic Message Scheduling Method for Time-Triggered CAN. 455-460 - Pekka Jääskeläinen

, Pertti Kellomäki, Jarmo Takala
, Heikki Kultala
, Mikael Lepistö:
Reducing Context Switch Overhead with Compiler-Assisted Threading. 461-466 - Bing Guo, Yan Shen, Lei Zhang, Xiang Zhou:

Research and Design of Shared Resources Competition Solution among Hardware-Software Tasks based on Unified Scheduling. 467-471 - Koji Nakano

, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito:
A Tiny Processing System for Education and Small Embedded Systems on the FPGAs. 472-479 - Chun-Chieh Lin, Chuen-Liang Chen:

Object Placement for Fully Associative Cache. 480-485 - Kai Zheng, Yongxin Zhu, Jun Xu:

Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor Simulator. 486-491
Workshop NCUS-08
- Tian-Wen Song, Chu-Sing Yang:

A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks. 495-500 - Wenjun Xiao, Mingxin He, Wenhong Wei:

CayleyChord: A Novel P2P Overlay Network. 501-506 - Ke Xu, Yahui Yang, Tao Chen:

Improving BitTorrent Network's Performance via Deploying Helpers. 507-512 - Zhi Chen, Guowei Huang, Jingdong Xu, Yang Yang:

Adaptive Load Balancing for Lookups in Heterogeneous DHT. 513-518 - Simone Cintra Chagas, Eber Huanca Cayo

, Koji Nakano
, Jacir Luiz Bordim:
The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM Networks. 519-523 - Lei He, Xiangjie Ma, Weili Zhang, Yunfei Guo, Hailong Ma:

The Analysis and Simulation of a Hybrid Video Broadcast Architecture. 524-531 - Slim Trabelsi, Guillaume Urvoy-Keller, Yves Roudier:

On the Impact of DoS Attacks on Secure Service Discovery. 532-537 - Nicole R. Nagel, Ruzbeh Shokranian, Jacir Luiz Bordim, Koji Nakano

:
MAC Layer Misbehavior on Ad Hoc Networks. 538-542 - Dineshbalu Balakrishnan, Amiya Nayak

, Pulak Dhar:
CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking. 543-548 - Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou:

Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. 549-552 - Gyeongtaek Lee, Jonghun Shin, Dae-Won Park, Hyuk-Chul Kwon:

Discovery Architecture for the Tracing of Products in the EPCglobal Network. 553-558 - Jindian Su, Shanshan Yu, Heqing Guo:

Analysis of Web Service Substitutability Based on Typed Pi-Calculus. 559-564 - Qi Liu, Nigel Linge:

A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment. 565-570 - Yu Huang, Bo Liu, XianPing Tao, Jiannong Cao

, Beihong Jin:
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks. 571-576 - Eunhoe Kim, Jaeyoung Choi:

A Context Management System for Supporting Context-Aware Applications. 577-582
Workshop TRUST-08, Session 1: Data Mining and Security
- Bhavani Thuraisingham, Latifur Khan

, Mohammad M. Masud
, Kevin W. Hamlen:
Data Mining for Security Applications. 585-589 - Longjun Zhang, Tao Zou:

A Trusted Third Party Based Secure Authentication Scheme of E-Commerce. 590-594 - Raphael C.-W. Phan

, Bok-Min Goi
:
Attacks on Improved Key Distribution Protocols with Perfect Reparability. 595-599
Workshop TRUST-08, Session 2: Trust Computing
- Omar Hasan, Jean-Marc Pierson

, Lionel Brunie:
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation. 603-609 - Mieso K. Denko, Tao Sun:

Probabilistic Trust Management in Pervasive Computing. 610-615 - Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki

:
Discovering the Most Trusted Agents without Central Control. 616-621
Workshop TRUST-08, Session 3: Service Computing and Management
- Won-Hee Han, Sung-Won Kim, Sun-Mi Park, Chang-Wu Lee, Jong Hyuk Park, Young-Sik Jeong:

Large-Scale USN Middleware Based on Context-Aware. 625-631 - Qiming Pan, Xiaoxia Huang:

Mean-Variance Model for International Portfolio Selection. 632-636 - Jia Zhang, Di Xu:

A Mobile Agent-Supported Web Services Testing Platform. 637-644
Workshop UUWSN-08, Session 1: Applications
- Hyung-jun Ju, Se-Young Kim, Jung-woo Han, Ki-Man Kim, Seok-yeb Kang:

Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater Speech Communication. 647-650 - Qian Sun, Shanqing Guo, Qiuliang Xu:

Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN. 651-654 - Phil-Jung Yun, Changhwa Kim, Sangkyung Kim:

ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol. 655-659
Workshop UUWSN-08, Session 2: Protocols
- Heungwoo Nam, Sunshin An:

Energy-Efficient Routing Protocol in Underwater Acoustic Sensor Networks. 663-669 - Hung Trong Nguyen, Soo Young Shin, Soo-Hyun Park:

Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks. 670-675 - Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim:

Scalable Uniformly-Distributed Clustering Mechanism for Sensor Networks. 676-681
Workshop UUWSN-08, Session 3: Systems
- Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park:

Point-to-Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks. 685-688 - Soo Young Shin, Soo-Hyun Park:

Omnet++ Based Simulation for Underwater Environment. 689-694
Workshop UWMN-08, Session 1: Ubiquitous Computing in Wireless Sensor Networks
- Liang-Cheng Shiu, Chao-Yang Lee

, Tian-Wen Song, Chu-Sing Yang:
On-Demand Deployment Algorithm for a Hybrid Sensor Network. 697-702 - Mianxiong Dong

, Gongwei Zhang, Kaoru Ota
, Song Guo
, Minyi Guo:
An Improved Design of the Ubiquitous Learning System Based on Sensor Networks. 703-708
Workshop UWMN-08, Session 2: Ubiquitous Computing in Wireless Ad Hoc Networks
- Jiangwei Zhou, Boqin Feng, Gangqiang Wei:

A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols. 711-716 - Usman Ashraf, Slim Abdellatif, Guy Juanole:

Route Stability in Wireless Mesh Access Networks. 717-722 - Hao Xu, Dejun Mu:

A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network. 723-728

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-15 23:30 CEST by the 







