Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
2010 IEEE International
Conference on Wireless
Communications, Networkingand Information Security
(WCNIS 2010)
Beijing, China25-27 June 2010
Volume 1
Pages 1-721
Editors:
Wen Chen Shaozi Li
ICtC IEEE Catalog Number: CFP1008J-PRT
I! mm mm ISBN: 978-1-4244-5850-9
1/2
TABLE OF CONTENTS
1-0001-1569270769 INTER-CARRIER COOPERATIVE CODING/DECODING FOR 1
OFDM SYSTEMS USING GEOMETRIC MEAN DECOMPOSITION
Rui Chen, Jiandong Li, Wei Liu, JianLi
1-0002-1569272075 ROBUST TRANSMISSION OF PROGRESSIVE IMAGES IN THE 4
DEEP SPACE COMMUNICATION
Zhang Jiayan, Ma Jing, Wu Shaochuan
1-0003-1569273015 A TURBO ITERATION ALGORITHM IN 16QAM HIERARCHICAL 9
MODULATION
XuZhe, Wang YongSheng, FlorenceAlberge, Pierre DUHAMEL
1-0004-1569275157 PERFORMANCE COMPARISON OF PHASE MODULATED SYSTEM 13
BASED ON DSSS WITH HPA NONLINEARITY
Zhang Jianfeng, Cheng Man, Liu Bo, Yue qiang
1-0005-1569275339 THE PERFORMANCE OF MULTILEVEL CODED 64DAPSK 18
MODULATED OFDM SYSTEM
Xinle Yv, Dandan Song, Zhanxin Yang
1-0006-1569276411 MULTI-CELL AND MULTI-USER DETECTION IN UPLINK FOR 23
MIMOSYSTEMS
Jinyuan Chen, JingyangLu
1-0007-1569277785 A MULTIPATH MITIGATION ALGORITHM IN GLOBAL 28
NAVIGATION SATELLITE SYSTEMS ARRAYS USING
INDEPENDENT COMPONENT ANALYSIS
Songtao Lu, Yun Zhao
1-0008-1569277957 SELF-ADAPTIVE ALGORITHM FOR IMAGE TRANSMISSION 33
BASED ON NARROW AND VARIABLE BANDWIDTH
LIU Gao-ping, ZHENG Zi-han
1-0009-1569278293 TRANSMISSION PROPERTIES STUDYOF PDGS WITH DEFECTED 37
TRIANGLES
JINTaobin, JINJie, YAORuipu, JIHongmeng, ZHANG Yizhen
1-0010-1569278424 PERFORMANCE ANALYSIS FOR MULTIUSER DUAL-HOP 41
DECODE-AND-FORWARD COOPERATIVE SYSTEM OVER
NAKAGAMI-M FADING CHANNELS
Wei-Guang Li, Hua-Min Chen, and Ming Chen
1-0011-1569278621 THE DESIGN OF LOCALIZATION IN WIRELESS SENSOR 45
NETWORKNODE BASED ON JENNIC PLATFORM
Guang-zhao Cui, Hao-bin Li
1-0012-1569278891 PERFORMANCE ANALYSIS OF OPPORTUNISTIC COOPERATIVE 49
COMMUNICATION OVER NAKAGAMI-M FADING CHANNELS
Runping Yuan, Taiyi Zhang, Jianxiong Huang, Jing Zhang, Zhenjie Feng
1-0013-1569279627 CAPACITY CRITERION-BASED POWER LOADING FOR 54
UNDERWATER ACOUSTIC OFDM SYSTEM WITH LIMITED
FEEDBACK
Xiaopeng Huang
1-0014-1569280371 DYNAMIC SPECTRUM ACCESS FOR COGNITIVE RADIO 59
SYSTEMS WITH REPEATED GAMES
Eongyan Li, YangLiu, Dexian Zhang
1-0015-1569280469 A FFT-WINDOW SEARCH ALGORITHM FOR DIVERSITY 63
COMBINING IN DOWNLINK MULTIPOINT JOINT TRANSMISSION
Guolin Sun andFeng Ye
1-0016-1569280781 AN ADAPTIVE METHOD FOR MULTI-USER MIMO POWER 68
CONTROLLED SYSTEMS
Mahdi Kashiha, MehrdadArdebilipow; Ehsan Soleimani-Nasab
1-0017-1569281283 A NEW PILOT DESIGN METHOD FOR OFDM SYSTEMS WITH 73
VIRTUAL SUBCARRIERS
Die Hu, Xiaolin Zhou
1-0018-1569281409 A DSP-BASED UNDERWATER COMMUNICATION MODEM USING 78
ELECTRIC CURRENT METHOD
ZhiqiangWu, Bin Li, JiadongXu
1-0019-1569281423 A SIMPLE CHANNEL SHORTENING EQUALIZER FOR WIRELESS 83
TDD-OFDM SYSTEMS
Ping Zhang andJiayin Qin
1-0020-1569281513 INDOOR WHITE LIGHT WIRELESS DATA TRANSMISSION BASED 87
ON NEW GENERATION ENVIRONMENT-FRIENDLY SOLID STATE
LIGHTING
JupengDing
1-0021-1569281541 EVOLUTIONARY GAME ALGORITHM FOR CHANNEL 92
ESTIMATION IN INTERLEAVE-DIVISION MULTIPLE ACCESS
SYSTEMS
Jie Song, Jianhao Hu and Zhao Wang
1-0022-1569281637 AN IMPROVED IWBF DECODING ALGORITHM BASED ON LDPC 98
CODES IN THE IMAGE TRANSMISSION
Wang Zhong-xun, Yu Xin-qiao, WangXing-cheng, Guo Dong
1-0023-1569281815 AODV ROUTE PROTOCOL RESEARCH BASED ON IMPROVED 102
ERS ALGORITHM
LIShibao, JIA Wei
1-0024-1569281989 A DUAL BAND NOTCHED ULTRA-WIDEBAND ANTENNA USING 107
COMPLEMENTARY SPLIT RING
RESONATORS
BinggangXIAO, Xiumin WANG, Jixiang ZHAO
1-0025-1569281993 A BAND NOTCHED ULTRA-WIDEBAND ANTENNA USING 110
COMPLEMENTARY SPLIT RING
RESONATOR
BinggangXIAO, Xiumin WANG, Jixiang ZHAO
1-0026-1569282185 ULTRA-WIDEBAND ANTENNA WITH FREQUENCY NOTCH 113
CHARACTERISTIC USING A
COMPLEMENTARY SPLIT RING RESONATOR
BinggangXIAO, Xiumin WANG, Jixiang ZHAO
1-0027-1569282257 AN IMPROVEMENT OF ENERGY EFFICIENT MULTI-HOP TIME 116
SYNCHRONIZATION ALGORITHM IN WIRELESS SENSOR
NETWORK
ZhehanDing, N. Yamauchi
1-0028-1569282281 DESIGN AND IMPLEMENTATION OF SIGNAL ACQUISITION 121
SYSTEM
BASED ON WIRELESS TRANSMISSION
Chunjiang Yao, Xiaohu Chen, comXuping Wang
1-0029-1569282397 A PRACTICAL TDOA POSITIONING METHOD FOR CDMA2000 126
MOBILE NETWORK
Weiguo Guan, Zhongliang Deng, Yuetao Ge, Dejun Zou
1-0030-1569282407 MULTI-CELL CHANNEL ESTIMATION AND MULTI-CELL JOINT 130
DETECTION IN TD-SCDMA SYSTEM
Xiang Zhang, Wenbo Wang, Shuping Chen, Chunyi Wang
1-0031-1569282447 DESIGN OF A WIRELESS PORTABLE VIBRATION ACQUISITION 135
AND ANALYSIS INSTRUMENT
Gengkun Wang, WeiXiang andJohn Leis, YafengWang
1-0032-1569282497 LINEAR COMBINATION DESIGN OF WAVELET PULSES FOR UWB 140
COMMUNICATION SYSTEM
BinXia, Peng Zhang, Qin Guo
1-0033-1569282519 DESIGN AND IMPLEMENTATION OF MESH-BASED CURRENT 143
DISTRIBUTION ON-LINE MONITORING SYSTEM IN ALUMINUM
REDUCTION CELLS
ZHAORentao, ZHANG Zhifang, TIEJun, LUun
1-0034-1569282561 OPTIMIZED LNA FOR ANALOG RF FRONT-END CIRCUIT IN 147
BRAIN-MACHINE INTERFACE
Haizheng Guo, Bo Wang, Bangli Liang, TadKwasniewski, Robert Sobot
1-0035-1569282719 AN SCHEME IMPROVED ON ITERATIVE DETECTION 151
ALGORITHMFOR V-BLAST
Wenbai Chen, Xiaopin Zhang, Wei Li
1-0036-1569282759 RESEARCH ON A REALIZATION METHOD OF THE OPTIMIZED 155
EFFICIENT SPECTRUM SIGNALS USING LEGENDRE SERIES
XUE Wei, MA Wei-qun, CHENBing-cai
1-0037-1569282783 OFDM SYMBOL DETECTION BASED ON FREQUENCY-DOMAIN 160
OVERSAMPLING
Qinghua Shi and Y. Karasawa
1-0038-1569282785 EFFECTS OF CHANNEL ESTIMATION ERRORS ON BPSK 165
SYSTEMS USING SUPERIMPOSED PILOTS
Gongpu Wang, Feifei Gao, Xuerong Gou, and Chintha Tellambura
1-0039-1569282797 PERFORMANCE SIMULATION OF A KIND OF CONFORMAL 169
SINUOUS ANTENNA WITH FOURARMS
Song Lizhong
1-0040-1569282799 SIMULATION AND ANALYSIS OF A SPHERICAL CONFORMAL 173
ARCHIMEDEAN SPIRAL ANTENNA
Song Lizhong
1-0041-1569283057 A NOVEL 3780-POINT FFT 178
XiaoGang YANG, WeiTao DU, JinGang YU, Rvi LV, ZhanXin YANG
1-0042-1569283637 A NOVEL COOPERATIVE SPECTRUM SENSING SCHEME BASED 183
ON CLUSTERING AND SOFTENED HARD COMBINATION
JiaqiDuan, YongLi
1-0043-1569283847 A NOVEL HALF-OVERLAP FMT SYSTEM USING CIC FILTER IN 188
COGNITIVE RADIO
XugangLiu, Hao Liu
1-0044-1569284599 DETECTION OF THE CDMA-BASED TRANSFORM DOMAIN 193
COMMUNICATION SYSTEM
Caihua Yin, Yu Zheng, Dawei Ma, Gang Yu, Jian Wang
1-0045-1569285175 A NEW KIND OF TRANSPORT LAYER ATTACK IN WIRELESS AD 198
HOC NETWORKS
VISHNU KMNNIT
1-0046-1569285719 POWER ALLOCATION IN OFDM-BASED COGNITIVE RELAY 202
NETWORKS
M. Shamim Kaiser, Kazi M, Ahmed, and Raza AH Shah
1-0047-1569285725 TOMLINSON-HARASHIMA PRECODING OPTIMIZATION OVER 207
CORRELATEDMIMO CHANNELS
H. Khaleghi Bizaki
1-0048-1569285731 CHANNEL IMPERFECTION EFFECTS ON THPPERFORMANCE IN 212
A SLOWLY TIME VARYING MIMO CHANNELS
H. Khaleghi Bizaki
1-0049-1569285871 A ROBUST QOS FRAMEWORK ON ANDROID FOR EFFECTIVE 217
MEDIA DELIVERY TO DLNA ENABLED HOME GATEWAY IN
SMART HOME ENVIRONMENT
KeyurkumarJ. Patel.S. Vijay Anand, Suman Kumar S.P
1-0050-1569285989 RESEARCH ON POSITION ALGORITHM BASED ON SIMILARITY 223
FOR WIRELESS ADHOC NETWORKS
LaiXin, Zhai Hualei, ZhuYi, Li Jim
1-0051-1569286593 THE DESIGN OF BINARY SHAPING FILTER OF BINARY CODE 228
Shao-Lun Huang, Yufei Blankenship, Lizhong Zheng,
1-0052-1569286769 CHANNEL ESTIMATION AND SYMBOL DEMODULATION OF THE 233
TRANSFORMDOMAIN COMMUNICATION SYSTEM
Caihua Yin, Dawei Ma, Yu Zheng, Gang Yu, Jian Wang
1-0053-1569288083 AN ADAPTIVE SRAKE RECEPTION OF BIORTHOGONAL IR-TH 237
UWB SIGNALS IN IEEE 802.15.4A INDUSTRIAL NLOS
ENVIRONMENT
Farah Haroon, Haroon Rasheed andKazi M. Ahmed
1-0054-1569288153 FREQUENCY DOMAIN EQUALIZATION WITH USER 242
INTERFERENCE CANCELLATION FOR 2-DIMENSIONAL BLOCK
SPREAD CDMASYSTEM
YanliangSun, RicaiTian, QiyueYu
1-0055-1569288235 MAXIMUM-LIKELIHOOD CFO ESTIMATION FOR MIMO/OFDM 247
UPLINK USING SUPERIMPOSED TRAININGS
Han Zhang, XianhuaDai
1-0056-1569288371 MEASUREMENT OF MOBILE RADIO PROPAGATION CHANNEL 252
IN RUINS
Ling Chen, Thomas Ostertag, Marc Loschonsky, Leonhard M. Reindl
1-0057-1569288451 INTERFERENCE MANAGEMENT FOR DS-CDMA RECEIVER 257
THROUGH BASE STATION ASSIGNMENT IN MULTIPATH FADING
CHANNELS
Mohammad Dosaranian Moghaddam, Hamidreza Bakhshi and Gholamreza
Dadashzadeh
1-0058-1569288465 RAPID MODELING, CHARACTERIZATION, OPTIMIZATION 264
METHODOLOGY AND ANALYSIS FOR LOW COST RF FILTER
DESIGN
HairolAzahaAbdul Samad, MohdFaruzi Shaiful, Mazlaim Yahya
1-0059-1569288687 CHARMS: COOPERATIVE HYBRID ARCHITECTURE FOR 269
RELAYING MULTICAST SATELLITE STREAMS TO SITES
WITHOUT A SATELLITE RECEIVER
Franco Tommasi, Simone Molendini, Elena Scialpi and Catiuscia Melle
1-0060-1569288690 AUTHENTICATION PROTOCOL RUNTIME EVALUATION IN 277
DISTRIBUTED AAA FRAMEWORK FOR MOBILE AD-HOC
NETWORKS
Sondes LARAFA, and Maryline LA URENT
1-0061-1569288696 PHASE SYNCHRONIZATION FOR DISTRIBUTED SENSOR 282
NETWORKS IN FEEDBACK BIT ERRORS
Haijie Wu, Yanwu Ding and Hyuck M. Kwon
1-0062-1569273557 A ROBUST WATERMARKING SCHEME FOR 3D POINT CLOUD 287
MODELS USING SELF-SIMILARITY PARTITION
QI Ke,Xie Dong-qing and Zhang Da-fang
1-0063-1569274751 A PROVABLY SECURE AUTHENTICATED KEY EXCHANGE 292
PROTOCOL
Lijiang Zhang
1-0064-1569274857 VOICE CONVERSION WITH A STRATEGY FOR SEPARATING 298
SPEAKER INDIVIDUALITY USING STATE-SPACE MODEL
NingXu Zhen Yang Haiyan Guo
1-0065-1569275007 A FASTNEW ONE-WAY CRYPTOGRAPHIC HASH FUNCTION 302
Liu Jian-dong, Tian Ye, Wang Shu-hong, Yang Kai
1-0066-1569275336 A SECURE KEY MANAGEMENT SYSTEM IN GROUP 307
STRUCTURED MOBILE AD HOC NETWORKS
Kamal Kumar Chauhan, Shashikala Tapaswi
1-0067-1569275387 A NOVEL HIDDEN MARKOV MODEL FOR DETECTING 312
COMPLICATE NETWORK ATTACKS
Shi Zhicai, Xia Yongxiang
1-0068-1569275831 COVERT CHANNELFOR LOCALAREA NETWORK 316
LipingJj, Yv Fan and Chuan Ma
1-0069-1569277693 MULTIPLE BEAMS SCANNING DOUBLE SQUARE LOOP 320
ANTENNA FOR UWB COMMUNICATIONS
Arun Raaza, Amit Mehta
1-0070-1569278315 (N, 1) SECRET SHARING APPROACH BASED ON 325
STEGANOGRAPHY WITH GRAY DIGITAL IMAGES
Jimuk Baek, Cheonshik Kim, Paul S. Fisher, andHongyang Chao
1-0071-1569278619 NEW DETECTION SCHEME FOR SPREAD SPECTRUM AUDIO 330
WATERMARKING
Lili Li, Xiangzhong Fang
1-0072-1569279171 A GENERIC ACCESS CONTROL MODELBASED ON ONTOLOGY 335
WANG Zhen-wu
1-0073-1569279737 DESIGN AND IMPLEMENTATION OFA DIDS 340
Hongmin Cai, Naiqi Wu
1-0074-1569280167 CONTENT-BASED NETWORK FILTERING OF ENCRYPTED 343
IMAGE DATA
Mohamed Hamdi andNoureddine Boudriga
1-0075-1569280609 AN EFFICIENT ROUTING PROTOCOL FOR ANONYMOUS 349
NETWORKS
Roman Schlegel, andDuncan S. Wong
1-0076-1569281193 INFORMATION HIDING ALGORITHM FOR PALETTE IMAGES 354
BASED ON HVS
Junling Ren
1-0077-1569281317 AN ANONYMOUS AUTHENTICATION SCHEME FOR MOBILE 359
COMMUNICATION
LIUJin-ye, GULi-ze, LUO Shou-shan, YANG Yi-xian
1-0078-1569281429 A FAST INFORMATION REPRODUCTION METHOD FOR HTTP IN 365
WLAN
Ming Wan, Nan Yao, Ying Liu, Hongke Zhang
1-0079-1569281469 COPYRIGHT SELFREGISTRATION AND ITS SECURE 370
AUTHENTICATIONBASED ON DIGITAL WATERMARK
Cheng Yang, Jianbo Liu, Yaqing Niu, Jiayin Han
1-0080-1569281471 AN EMPIRICALVULNERABILITY REMEDIATION MODEL 376
Deepak Subramanian, Ha Thanh Le, Peter Kok Keong Loh, Annamalai
Benjamin Premkumar
1-0081-1569281509 MULTI-CONDITIONAL E-CASH WITH TRANSFERABILITY 381
YingLi, Lu-Sheng Chen
1-0082-1569281623 A METHOD FOR TOPOLOGY CONFORMANCE TESTS UNDER 386
LOGICAL CONSTRAINTS
Jianwu Zhang, GuoaiXu, Yixian Yang, Shize Guo
1-0083-1569281633 ANEWAPPROACHFOR IMAGE RETRIEVAL WITH INTEGRATED 391
EUCLIDEAN DISTANCE AND ROTATIONAL CORRELATION
Jianfeng Wang Xiaorong Zhao
1-0084-1569281649 THE CHARACTERIZATIONS OF BINARY VECTOR-OUTPUT 396
PLATEAUED FUNCTIONS
Tinghai Yue
1-0085-1569281659 A CONSTRUCTION OF BINARY VECTOR-OUTPUT PLATEAUED 401
FUNCTIONS
Tinghai Yue
1-0086-1569281781 A NEW APPROACH TO NULL SPACE-BASED NOISE SIGNAL 406
GENERATION FOR SECURE WIRELESS COMMUNICATIONS IN
TRANSMIT-RECEIVE DIVERSITY SYSTEMS
Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, and Hamid Sharif
1-0087-1569281787 LOW COMPLEXITY VIDEO WATERMARKING ALGORITHM BY 411
EXPLOITING CAVLC IN H.264/AVC
Da-wen Xu, Rang-ding WANG, Ji-cheng WA N G
1-0088-1569281807 THE RESEARCH OF WORM DISTRIBUTED DETECTION
TECHNOLOGYBASED ON NETWORK SECURITY
Tong Xiaojun, Zhao Zhangquan, ShuaiHuimin, Wang Zhu
1-0089-1569281849 A BLIND DIGITAL WATERMARKING FOR COLOR MEDICAL
IMAGES BASED ON PCA
Xinde Sun and Shukui Bo
1-0090-1569281861
1-0091-1569281883
1-0092-1569281973
1-0093-1569281987
1-0094-1569282057
1-0095-1569282083
1-0096-1569282121
1-0097-1569282143
1-0098-1569282163
1-0099-1569282199
1-0100-1569282289
1-0101-1569282291
A SIP DOS FLOODING ATTACK DEFENSE MECHANISM BASED
ON PRIORITY CLASS QUEUE
Wan Xiao-Yu, Zhang Li, Fan Zi-Fu
VLB-VNE: A REGIONALIZED VALIANT LOAD-BALANCING
ALGORITHM IN VIRTUAL NETWORK MAPPING
Fan Yang, Zhen-kai Wang, Jian-ya Chen, Yim-jie Liu
IMPROVING THE PERTURBED QUANTIZATION
STEGANOGRAPHY BY MODIFIED MATRIX ENCODING
Xuexiu Zhu, Weiming Zhang, Jianqing Qi, Jiufen Liu
AN IMPROVED SECURITY AUTHENTICATION MECHANISM FOR
PARLAY/OSAFRAMEWORK BASED ON SSLYTLS
Fan Zi-Fu, Zhang Yi, Wan Xiao-Yu
THE ANALYSIS AND RESEARCH OF SELFISH QUESTION IN P2P
Chang Lulu, GuoChao, HuYongsheng
A MODIFIED MIN-SUM ALGORITHM FOR LOW-DENSITY
PARITY-CHECKCODES
Wei Han, Jianguo Huang, Fangfei Wu
PUBLICKEY CRYPTOSYSTEM BASED ON PERMUTATION
RATIONAL FUNCTION
Pengcheng Wei, Ran Wei, Yingxian Zhu, Xinbo Yang
A NETWORK SECURITY SYSTEM MODELBASED ON FPGA
Bo Zhou,Wei Han, Huafeng Wu
ROBUST WATERMARKING IN MULTIWAVELET DOMAIN BASED
ONAVERAGE SUBIMAGE OF LOW FREQUENCY
Xiaonian Tang and Guijun Man, Jianchun Wang andXiaoyan Tang
BEHAVIOR PROFILING FOR ROBUST ANOMALYDETECTION
Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang
COVERT COMMUNICATION BASED ON WAVEFORM OVERLAY
WITH WEIGHTED FRACTIONAL FOURIER TRANSFORM
SIGNALS
Lin Mei, Xuejun Sha, andNaitong Zhang
IMPROVED UNIDIRECTIONAL CHOSEN-CIPHERTEXT SECURE
PROXYRE-ENCRYPTION
Zhao Guoan, Fang Liming, Wang Jiandong, Ge Chunpeng, andRen Yongjun
1-0102-1569282307 AN IDENTITY-BASED SECURITY MECHANISM FOR P2P VOIP 481
Hua Jiang, YongxingJia, XianruDu, WeizhiWang
1-0103-1569282313 AN EFFICIENT UNLINKABLE SECRET HANDSHAKE PROTOCOL 486
WITHOUT ROM
Zhao Guoan, Tan Canghai, Ren Yongjun, Fang Liming
1-0104-1569282315 A DISTRIBUTED KEY MANAGEMENT SCHEME BASED ON 491
SGC-PKC FOR P2P NETWORK
Hua Jiang, YongxingJia, Rui Zhang, Shanming Liu
1-0105-1569282399 COMPUTATION AND ANALYSIS OF NODE INTENDING TRUST IN 496
WSNS
Tian Liqin , Lin chuang
1-0106-1569282533 A QUEUING ANALYSIS FOR LOW-RATE DOS ATTACKS AGAINST 500
APPLICATION SERVERS
Xiaodong Xu, Xiao Guo, Shirui Zhu
1-0107-1569282535 SECURING MULTI-TIERED WEB APPLICATIONS 505
George Mathew, XiaojiangDu
1-0108-1569282631 DESIGN AND IMPLEMENTATION OF MULTIPLE 510
CRYPTOGRAPHIC ALGORITHM INTERFACE CIRCUIT BASED
ON SECURE SOC
Luguo ZHANG, Zheng LI, Ruijiao WANG, Shengjun WEN
1-0109-1569282643 MULTI-PARTY CONCURRENT SIGNATURES BASED ON SHORT 515
RING SIGNATURES
WANG Ling-ling
1-0110-1569282653 A COLOR IMAGE WATERMARKING ALGORITHMRESISTANT TO 518
PRINT-SCAN
Chengqing GUO, Gvoai XU, Xinxin NJU, Yixian YANG, Yang LI
1-0111-1569282721 RESEARCH ON THE MULTIHOMING SCHEME IN ALOC/ID SPLIT 522
CONTEXT
Haisheng Jiang, Sidong Zhang
1-0112-1569282765 A CREDIBLE NETWORK INTRUSION DETECTION SYSTEM 528
BASED ON GRID
Shtiying Zhang, Shu/en Liu, Ytie Gao, Jianmei Ge, Limin Wang
1-0113-1569282771 ONE-PASS KEY ESTABLISHMENT FOR ANONYMOUS WIRELESS 533
ROAMING
Yuan Wang, Duncan S. Wong, and Liusheng Huang
1-0114-1569282805 PRIME-BASED MIMIC FUNCTIONS FORTHE IMPLEMENTATION 538
OF COVERT CHANNELS
WESLEYCONNELL, DAN TAMR, MNA GUIRGUIS
1-0115-1569282813 OBJECTIVE EVALUATION OF SPIDER DETECTION TECHNIQUES
Fan Chunlong, Yu Zhouhua, andXu Lei
1-0116-1569282851 A NEW MODEL OF FORMAL DESIGN SYSTEM OF SECURITY
AUTHENTICATION PROTOCOL
Wang Hui-bin
1-0117-1569282867 SECRET IMAGES SHARING SCHEME USING TWO-VARIABLE
ONE-WAYFUNCTIONS
Todorka ALEXANDROVA, Yoshiaki SUZUKI, Kan OKUBO, and Norio
TAGAWA
1-0118-1569282883 EFFICIENT AND PROVABLY SECURE CERTIFICATELESS
SIGNCRYPTION FROM BILINEAR MAPS
Wenjian Xie and Zhang Zhang
1-0119-1569283037 TRUST OPPORTUNISTIC ROUTING PROTOCOL IN MULTI-HOP
WIRELESS NETWORKS
WangBo, Huang Chitanhe, Yang Wenzhong, WangTong
1-0120-1569283069 RESEARCH ON RFID SECURITY PROTOCOL BASED ON
GROUPED TAGS AND RE-ENCRYPTION SCHEME
Chunhui Piao, ZhenjiangFan, ChunyanYang, XufangHan
1-0121-1569283079 PERIODIC SEQUENCE IN NETFLOW RECOGNIZING
ALGORITHM
He Tao, Zhong Hao
1-0122-1569283081 RAILWAY PASSENGER DYNAMIC E-BUSINESS BASED ON WEB
SERVICES AND RFID
JingdongSUN, Yibin ZHANG
1-0123-1569283541 HIGH-SPEED ARCHITECTURES FOR GHASH BASED ON
EFFICIENT BIT-PARALLEL MULTIPLIERS
Jimei Wang, Guochu Shou, Yihong Hu, Zhigang Guo
1-0124-1569283565 GROWTH CUSTOMER INFORMATION MINING ANALYSIS WITH
ASSOCIATION RULES IN ON LINE FINANCIAL WEB SITE
Dai Zhi-min, GuoLu
1-0125-1569284323 APPLICATION OF BP NEURAL NETWORK IN WIRELESS
NETWORK SECURITY EVALUATION
JianxinFui Lianfen Huang, YanYao
1-0126-1569285493 ON THE PRIVACY PROTECTION IN PUBLISH/SUBSCRIBE
SYSTEMS
Weifeng Chen, Jianchun Jiang, Nancy Skocik
1-0127-1569286113 IMPROVEMENT OF ONE ESCROW-FREE IDENTITY-BASED
SIGNATURE
LihuaLiu, Zhengjun Cao
1-0128-1569286241 COMBATING SELF-LEARNING WORMS BY USING PREDATORS 607
Fangwei Wang, Yunkcti Zhang, Honggang Guo, and Changguang Wang
1-0129-1569286467 COMPRESSED VIDEO COPY DETECTION BASED ON TEXTURE 612
ANALYSIS
Zhijie Zhang, Fang Yuan
1-0130-1569287O75 PREDICTION MODEL OF NETWORK SECURITY SITUATION 616
BASED ON REGRESSION ANALYSIS
XiaWei-wei, Wang Hai-feng
1-0131-1569287361 A SOFTWARE VULNERABILITY ANALYSIS ENVIRONMENT 620
BASED ON VIRTUALIZATION TECHNOLOGY
WangChunleit WenYan, DaiYiqi
1-0132-1569287749 THE STUDY OF WATERMARKING ALGORITHM FOR VECTOR 625
GEOSPATIAL DATA BASED ON THE PHASE OF DFT
DeheXu, Qisheng Wang
1-0133-1569287841 A GENERIC DATA MODEL WITH A DECOMPOSITION 630
OPERATION FOR DRM INTEROPERABILITY
WenhuiLu, Zheying Zhang, Jyrki Nummenmaa
1-0134-1569287919 AN ATTACK-RESILIENT GRID AUDITING INFRASTRUCTURE 635
Christopher Kum, Jan Wiebelitz and Matthew Smith
1-0135-1569288299 COUNT OF ANNIHILATORS OF BOOLEAN FUNCTIONS WITH 640
GIVEN ALGEBRAIC IMMUNITY
YusongDU, DingyiPEI
1-0136-1569288411 AN IDENTITY-BASED SECURITY INFRASTRUCTURE FOR CLOUD 644
ENVIRONMENTS
Christian Schridde, Tim Dornemann, Ernst Juhnke, Bernd Freisleben,
Matthew Smith
1-0137-1569288419 ELLIPTIC CURVE CRYPTOGRAPHY BASED MUTUAL 650
AUTHENTICATION PROTOCOL FOR LOW
COMPUTATIONAL CAPACITY RFID SYSTEMS - PERFORMANCE
ANALYSIS BY SIMULATIONS
Gyozo Godor, Norbert Giczi, Sandor Imre Dr.
1-0138-1569288509 FAST-FLUX ATTACK NETWORK DDENTIFICATION BASED ON 658
AGENT LIFESPAN
Sheng Yu, Shijie Zhou, and Sha Wang
1-0139-1569288571 RESEARCH ON A SECURE MOBILE PAYMENT BASED ON 663
MULTI-AGENTS
Wang Qiongqiong, Xin Mingjun
1-0140-1569288575 APPLICATION LEVEL NETWORK ACCESS CONTROL SYSTEM 667
BASED ONTNC ARCHITECTURE FOR ENTERPRISE NETWORK
Zhen Chen, Fa-Chao Deng, An-An Luo, Xin Jiang, Guo-Dong Li, Run-hua
Zhang, ChuangLin
1-0141-1569288595 AASC: ANONYMIZING NETWORK ADDRESSES BASED ON 672
SUBNET CLUSTERING
Ti Tang, Yuanyuan Wu, Quart Zhou
1-0142-1569288615 BIOMETRIC VERIFICATION USING HAND VEIN-PATTERNS 677
Xue Yuan
1-0143-1569288649 AUTONOMOUS AGENT BASED INTRUSION DETECTION IN 682
VIRTUALCOMPUTING ENVIRONMENT
Alex K. Ohoussov, Hai Jin, Deqing Zou, Feng Zhao, Guofu Xiang, Ge Cheng
1-0144-1569288659 RESEARCH ON A BEHAVIOR-BASED ACTIVE CONTROLLABLE 687
DEFENSE MODELAND ITS APPLICATION
Zhitao Guan, Jietao He, Kehe Wu, Shuai Yuan
1-0145-1569288711 ANALYSIS OF ATTACK MODELS VIA UNIFIED MODELING 692
LANGUAGE IN WIRELESS SENSOR NETWORKS: A SURVEY
STUDY
Sunghyuck Hong, Sunho Lim
1-0146-1569288777 WIDEBAND AUDIO OVER NARROWBAND BASED ON 697
DIGITALWATERMARKING
Zhenyi Lao andJiying Zhao
1-0147-1569288781 A KEY-CODE WATERMARKING ALGORITHM FOR VIDEO 702
CONTENT PROTECTION
Myoung-Hoon Lee, Vincent So, and Jiying Zhao
1-0148-1569288783 NETWORK PEFORMANCE EVALUATION OF ROUTERS IN 707
IPV4/IPV6 ENVIRONMENT
Shaneel Narayan (Member IEEE), Shailendra S. Sodhi, Paula R. Lutui,
Kaushik J. Vijayakumar
1-0149-1569288791 INTRUSION DETECTION OF SINKHOLE ATTACKS IN 711
LARGE-SCALE WIRELESS SENSORNETWORKS
Changlong Chen, Min Song, and George Hsieh
1-0150-1569296004 TRUST MANAGEMENT FOR MOBILE AGENT SYSTEM BASED ON 717
TRUSTED COMPUTING PLATFORMS
Zhidong Shen, Xiaoping Wu, Jing Zhan
AUTHOR INDEX