13
2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010) Beijing, China 25-27 June 2010 Volume 1 Pages 1-721 Editors: Wen Chen Shaozi Li ICtC IEEE Catalog Number: CFP1008J-PRT I ! mmmm ISBN: 978-1-4244-5850-9 1/2

2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

2010 IEEE International

Conference on Wireless

Communications, Networkingand Information Security

(WCNIS 2010)

Beijing, China25-27 June 2010

Volume 1

Pages 1-721

Editors:

Wen Chen Shaozi Li

ICtC IEEE Catalog Number: CFP1008J-PRT

I! mm mm ISBN: 978-1-4244-5850-9

1/2

Page 2: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

TABLE OF CONTENTS

1-0001-1569270769 INTER-CARRIER COOPERATIVE CODING/DECODING FOR 1

OFDM SYSTEMS USING GEOMETRIC MEAN DECOMPOSITION

Rui Chen, Jiandong Li, Wei Liu, JianLi

1-0002-1569272075 ROBUST TRANSMISSION OF PROGRESSIVE IMAGES IN THE 4

DEEP SPACE COMMUNICATION

Zhang Jiayan, Ma Jing, Wu Shaochuan

1-0003-1569273015 A TURBO ITERATION ALGORITHM IN 16QAM HIERARCHICAL 9

MODULATION

XuZhe, Wang YongSheng, FlorenceAlberge, Pierre DUHAMEL

1-0004-1569275157 PERFORMANCE COMPARISON OF PHASE MODULATED SYSTEM 13

BASED ON DSSS WITH HPA NONLINEARITY

Zhang Jianfeng, Cheng Man, Liu Bo, Yue qiang

1-0005-1569275339 THE PERFORMANCE OF MULTILEVEL CODED 64DAPSK 18

MODULATED OFDM SYSTEM

Xinle Yv, Dandan Song, Zhanxin Yang

1-0006-1569276411 MULTI-CELL AND MULTI-USER DETECTION IN UPLINK FOR 23

MIMOSYSTEMS

Jinyuan Chen, JingyangLu

1-0007-1569277785 A MULTIPATH MITIGATION ALGORITHM IN GLOBAL 28

NAVIGATION SATELLITE SYSTEMS ARRAYS USING

INDEPENDENT COMPONENT ANALYSIS

Songtao Lu, Yun Zhao

1-0008-1569277957 SELF-ADAPTIVE ALGORITHM FOR IMAGE TRANSMISSION 33

BASED ON NARROW AND VARIABLE BANDWIDTH

LIU Gao-ping, ZHENG Zi-han

1-0009-1569278293 TRANSMISSION PROPERTIES STUDYOF PDGS WITH DEFECTED 37

TRIANGLES

JINTaobin, JINJie, YAORuipu, JIHongmeng, ZHANG Yizhen

1-0010-1569278424 PERFORMANCE ANALYSIS FOR MULTIUSER DUAL-HOP 41

DECODE-AND-FORWARD COOPERATIVE SYSTEM OVER

NAKAGAMI-M FADING CHANNELS

Wei-Guang Li, Hua-Min Chen, and Ming Chen

1-0011-1569278621 THE DESIGN OF LOCALIZATION IN WIRELESS SENSOR 45

NETWORKNODE BASED ON JENNIC PLATFORM

Guang-zhao Cui, Hao-bin Li

1-0012-1569278891 PERFORMANCE ANALYSIS OF OPPORTUNISTIC COOPERATIVE 49

COMMUNICATION OVER NAKAGAMI-M FADING CHANNELS

Runping Yuan, Taiyi Zhang, Jianxiong Huang, Jing Zhang, Zhenjie Feng

Page 3: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

1-0013-1569279627 CAPACITY CRITERION-BASED POWER LOADING FOR 54

UNDERWATER ACOUSTIC OFDM SYSTEM WITH LIMITED

FEEDBACK

Xiaopeng Huang

1-0014-1569280371 DYNAMIC SPECTRUM ACCESS FOR COGNITIVE RADIO 59

SYSTEMS WITH REPEATED GAMES

Eongyan Li, YangLiu, Dexian Zhang

1-0015-1569280469 A FFT-WINDOW SEARCH ALGORITHM FOR DIVERSITY 63

COMBINING IN DOWNLINK MULTIPOINT JOINT TRANSMISSION

Guolin Sun andFeng Ye

1-0016-1569280781 AN ADAPTIVE METHOD FOR MULTI-USER MIMO POWER 68

CONTROLLED SYSTEMS

Mahdi Kashiha, MehrdadArdebilipow; Ehsan Soleimani-Nasab

1-0017-1569281283 A NEW PILOT DESIGN METHOD FOR OFDM SYSTEMS WITH 73

VIRTUAL SUBCARRIERS

Die Hu, Xiaolin Zhou

1-0018-1569281409 A DSP-BASED UNDERWATER COMMUNICATION MODEM USING 78

ELECTRIC CURRENT METHOD

ZhiqiangWu, Bin Li, JiadongXu

1-0019-1569281423 A SIMPLE CHANNEL SHORTENING EQUALIZER FOR WIRELESS 83

TDD-OFDM SYSTEMS

Ping Zhang andJiayin Qin

1-0020-1569281513 INDOOR WHITE LIGHT WIRELESS DATA TRANSMISSION BASED 87

ON NEW GENERATION ENVIRONMENT-FRIENDLY SOLID STATE

LIGHTING

JupengDing

1-0021-1569281541 EVOLUTIONARY GAME ALGORITHM FOR CHANNEL 92

ESTIMATION IN INTERLEAVE-DIVISION MULTIPLE ACCESS

SYSTEMS

Jie Song, Jianhao Hu and Zhao Wang

1-0022-1569281637 AN IMPROVED IWBF DECODING ALGORITHM BASED ON LDPC 98

CODES IN THE IMAGE TRANSMISSION

Wang Zhong-xun, Yu Xin-qiao, WangXing-cheng, Guo Dong

1-0023-1569281815 AODV ROUTE PROTOCOL RESEARCH BASED ON IMPROVED 102

ERS ALGORITHM

LIShibao, JIA Wei

1-0024-1569281989 A DUAL BAND NOTCHED ULTRA-WIDEBAND ANTENNA USING 107

COMPLEMENTARY SPLIT RING

RESONATORS

Page 4: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

BinggangXIAO, Xiumin WANG, Jixiang ZHAO

1-0025-1569281993 A BAND NOTCHED ULTRA-WIDEBAND ANTENNA USING 110

COMPLEMENTARY SPLIT RING

RESONATOR

BinggangXIAO, Xiumin WANG, Jixiang ZHAO

1-0026-1569282185 ULTRA-WIDEBAND ANTENNA WITH FREQUENCY NOTCH 113

CHARACTERISTIC USING A

COMPLEMENTARY SPLIT RING RESONATOR

BinggangXIAO, Xiumin WANG, Jixiang ZHAO

1-0027-1569282257 AN IMPROVEMENT OF ENERGY EFFICIENT MULTI-HOP TIME 116

SYNCHRONIZATION ALGORITHM IN WIRELESS SENSOR

NETWORK

ZhehanDing, N. Yamauchi

1-0028-1569282281 DESIGN AND IMPLEMENTATION OF SIGNAL ACQUISITION 121

SYSTEM

BASED ON WIRELESS TRANSMISSION

Chunjiang Yao, Xiaohu Chen, comXuping Wang

1-0029-1569282397 A PRACTICAL TDOA POSITIONING METHOD FOR CDMA2000 126

MOBILE NETWORK

Weiguo Guan, Zhongliang Deng, Yuetao Ge, Dejun Zou

1-0030-1569282407 MULTI-CELL CHANNEL ESTIMATION AND MULTI-CELL JOINT 130

DETECTION IN TD-SCDMA SYSTEM

Xiang Zhang, Wenbo Wang, Shuping Chen, Chunyi Wang

1-0031-1569282447 DESIGN OF A WIRELESS PORTABLE VIBRATION ACQUISITION 135

AND ANALYSIS INSTRUMENT

Gengkun Wang, WeiXiang andJohn Leis, YafengWang

1-0032-1569282497 LINEAR COMBINATION DESIGN OF WAVELET PULSES FOR UWB 140

COMMUNICATION SYSTEM

BinXia, Peng Zhang, Qin Guo

1-0033-1569282519 DESIGN AND IMPLEMENTATION OF MESH-BASED CURRENT 143

DISTRIBUTION ON-LINE MONITORING SYSTEM IN ALUMINUM

REDUCTION CELLS

ZHAORentao, ZHANG Zhifang, TIEJun, LUun

1-0034-1569282561 OPTIMIZED LNA FOR ANALOG RF FRONT-END CIRCUIT IN 147

BRAIN-MACHINE INTERFACE

Haizheng Guo, Bo Wang, Bangli Liang, TadKwasniewski, Robert Sobot

1-0035-1569282719 AN SCHEME IMPROVED ON ITERATIVE DETECTION 151

ALGORITHMFOR V-BLAST

Wenbai Chen, Xiaopin Zhang, Wei Li

1-0036-1569282759 RESEARCH ON A REALIZATION METHOD OF THE OPTIMIZED 155

Page 5: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

EFFICIENT SPECTRUM SIGNALS USING LEGENDRE SERIES

XUE Wei, MA Wei-qun, CHENBing-cai

1-0037-1569282783 OFDM SYMBOL DETECTION BASED ON FREQUENCY-DOMAIN 160

OVERSAMPLING

Qinghua Shi and Y. Karasawa

1-0038-1569282785 EFFECTS OF CHANNEL ESTIMATION ERRORS ON BPSK 165

SYSTEMS USING SUPERIMPOSED PILOTS

Gongpu Wang, Feifei Gao, Xuerong Gou, and Chintha Tellambura

1-0039-1569282797 PERFORMANCE SIMULATION OF A KIND OF CONFORMAL 169

SINUOUS ANTENNA WITH FOURARMS

Song Lizhong

1-0040-1569282799 SIMULATION AND ANALYSIS OF A SPHERICAL CONFORMAL 173

ARCHIMEDEAN SPIRAL ANTENNA

Song Lizhong

1-0041-1569283057 A NOVEL 3780-POINT FFT 178

XiaoGang YANG, WeiTao DU, JinGang YU, Rvi LV, ZhanXin YANG

1-0042-1569283637 A NOVEL COOPERATIVE SPECTRUM SENSING SCHEME BASED 183

ON CLUSTERING AND SOFTENED HARD COMBINATION

JiaqiDuan, YongLi

1-0043-1569283847 A NOVEL HALF-OVERLAP FMT SYSTEM USING CIC FILTER IN 188

COGNITIVE RADIO

XugangLiu, Hao Liu

1-0044-1569284599 DETECTION OF THE CDMA-BASED TRANSFORM DOMAIN 193

COMMUNICATION SYSTEM

Caihua Yin, Yu Zheng, Dawei Ma, Gang Yu, Jian Wang

1-0045-1569285175 A NEW KIND OF TRANSPORT LAYER ATTACK IN WIRELESS AD 198

HOC NETWORKS

VISHNU KMNNIT

1-0046-1569285719 POWER ALLOCATION IN OFDM-BASED COGNITIVE RELAY 202

NETWORKS

M. Shamim Kaiser, Kazi M, Ahmed, and Raza AH Shah

1-0047-1569285725 TOMLINSON-HARASHIMA PRECODING OPTIMIZATION OVER 207

CORRELATEDMIMO CHANNELS

H. Khaleghi Bizaki

1-0048-1569285731 CHANNEL IMPERFECTION EFFECTS ON THPPERFORMANCE IN 212

A SLOWLY TIME VARYING MIMO CHANNELS

H. Khaleghi Bizaki

1-0049-1569285871 A ROBUST QOS FRAMEWORK ON ANDROID FOR EFFECTIVE 217

MEDIA DELIVERY TO DLNA ENABLED HOME GATEWAY IN

Page 6: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

SMART HOME ENVIRONMENT

KeyurkumarJ. Patel.S. Vijay Anand, Suman Kumar S.P

1-0050-1569285989 RESEARCH ON POSITION ALGORITHM BASED ON SIMILARITY 223

FOR WIRELESS ADHOC NETWORKS

LaiXin, Zhai Hualei, ZhuYi, Li Jim

1-0051-1569286593 THE DESIGN OF BINARY SHAPING FILTER OF BINARY CODE 228

Shao-Lun Huang, Yufei Blankenship, Lizhong Zheng,

1-0052-1569286769 CHANNEL ESTIMATION AND SYMBOL DEMODULATION OF THE 233

TRANSFORMDOMAIN COMMUNICATION SYSTEM

Caihua Yin, Dawei Ma, Yu Zheng, Gang Yu, Jian Wang

1-0053-1569288083 AN ADAPTIVE SRAKE RECEPTION OF BIORTHOGONAL IR-TH 237

UWB SIGNALS IN IEEE 802.15.4A INDUSTRIAL NLOS

ENVIRONMENT

Farah Haroon, Haroon Rasheed andKazi M. Ahmed

1-0054-1569288153 FREQUENCY DOMAIN EQUALIZATION WITH USER 242

INTERFERENCE CANCELLATION FOR 2-DIMENSIONAL BLOCK

SPREAD CDMASYSTEM

YanliangSun, RicaiTian, QiyueYu

1-0055-1569288235 MAXIMUM-LIKELIHOOD CFO ESTIMATION FOR MIMO/OFDM 247

UPLINK USING SUPERIMPOSED TRAININGS

Han Zhang, XianhuaDai

1-0056-1569288371 MEASUREMENT OF MOBILE RADIO PROPAGATION CHANNEL 252

IN RUINS

Ling Chen, Thomas Ostertag, Marc Loschonsky, Leonhard M. Reindl

1-0057-1569288451 INTERFERENCE MANAGEMENT FOR DS-CDMA RECEIVER 257

THROUGH BASE STATION ASSIGNMENT IN MULTIPATH FADING

CHANNELS

Mohammad Dosaranian Moghaddam, Hamidreza Bakhshi and Gholamreza

Dadashzadeh

1-0058-1569288465 RAPID MODELING, CHARACTERIZATION, OPTIMIZATION 264

METHODOLOGY AND ANALYSIS FOR LOW COST RF FILTER

DESIGN

HairolAzahaAbdul Samad, MohdFaruzi Shaiful, Mazlaim Yahya

1-0059-1569288687 CHARMS: COOPERATIVE HYBRID ARCHITECTURE FOR 269

RELAYING MULTICAST SATELLITE STREAMS TO SITES

WITHOUT A SATELLITE RECEIVER

Franco Tommasi, Simone Molendini, Elena Scialpi and Catiuscia Melle

1-0060-1569288690 AUTHENTICATION PROTOCOL RUNTIME EVALUATION IN 277

DISTRIBUTED AAA FRAMEWORK FOR MOBILE AD-HOC

NETWORKS

Page 7: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

Sondes LARAFA, and Maryline LA URENT

1-0061-1569288696 PHASE SYNCHRONIZATION FOR DISTRIBUTED SENSOR 282

NETWORKS IN FEEDBACK BIT ERRORS

Haijie Wu, Yanwu Ding and Hyuck M. Kwon

1-0062-1569273557 A ROBUST WATERMARKING SCHEME FOR 3D POINT CLOUD 287

MODELS USING SELF-SIMILARITY PARTITION

QI Ke,Xie Dong-qing and Zhang Da-fang

1-0063-1569274751 A PROVABLY SECURE AUTHENTICATED KEY EXCHANGE 292

PROTOCOL

Lijiang Zhang

1-0064-1569274857 VOICE CONVERSION WITH A STRATEGY FOR SEPARATING 298

SPEAKER INDIVIDUALITY USING STATE-SPACE MODEL

NingXu Zhen Yang Haiyan Guo

1-0065-1569275007 A FASTNEW ONE-WAY CRYPTOGRAPHIC HASH FUNCTION 302

Liu Jian-dong, Tian Ye, Wang Shu-hong, Yang Kai

1-0066-1569275336 A SECURE KEY MANAGEMENT SYSTEM IN GROUP 307

STRUCTURED MOBILE AD HOC NETWORKS

Kamal Kumar Chauhan, Shashikala Tapaswi

1-0067-1569275387 A NOVEL HIDDEN MARKOV MODEL FOR DETECTING 312

COMPLICATE NETWORK ATTACKS

Shi Zhicai, Xia Yongxiang

1-0068-1569275831 COVERT CHANNELFOR LOCALAREA NETWORK 316

LipingJj, Yv Fan and Chuan Ma

1-0069-1569277693 MULTIPLE BEAMS SCANNING DOUBLE SQUARE LOOP 320

ANTENNA FOR UWB COMMUNICATIONS

Arun Raaza, Amit Mehta

1-0070-1569278315 (N, 1) SECRET SHARING APPROACH BASED ON 325

STEGANOGRAPHY WITH GRAY DIGITAL IMAGES

Jimuk Baek, Cheonshik Kim, Paul S. Fisher, andHongyang Chao

1-0071-1569278619 NEW DETECTION SCHEME FOR SPREAD SPECTRUM AUDIO 330

WATERMARKING

Lili Li, Xiangzhong Fang

1-0072-1569279171 A GENERIC ACCESS CONTROL MODELBASED ON ONTOLOGY 335

WANG Zhen-wu

1-0073-1569279737 DESIGN AND IMPLEMENTATION OFA DIDS 340

Hongmin Cai, Naiqi Wu

1-0074-1569280167 CONTENT-BASED NETWORK FILTERING OF ENCRYPTED 343

IMAGE DATA

Mohamed Hamdi andNoureddine Boudriga

Page 8: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

1-0075-1569280609 AN EFFICIENT ROUTING PROTOCOL FOR ANONYMOUS 349

NETWORKS

Roman Schlegel, andDuncan S. Wong

1-0076-1569281193 INFORMATION HIDING ALGORITHM FOR PALETTE IMAGES 354

BASED ON HVS

Junling Ren

1-0077-1569281317 AN ANONYMOUS AUTHENTICATION SCHEME FOR MOBILE 359

COMMUNICATION

LIUJin-ye, GULi-ze, LUO Shou-shan, YANG Yi-xian

1-0078-1569281429 A FAST INFORMATION REPRODUCTION METHOD FOR HTTP IN 365

WLAN

Ming Wan, Nan Yao, Ying Liu, Hongke Zhang

1-0079-1569281469 COPYRIGHT SELFREGISTRATION AND ITS SECURE 370

AUTHENTICATIONBASED ON DIGITAL WATERMARK

Cheng Yang, Jianbo Liu, Yaqing Niu, Jiayin Han

1-0080-1569281471 AN EMPIRICALVULNERABILITY REMEDIATION MODEL 376

Deepak Subramanian, Ha Thanh Le, Peter Kok Keong Loh, Annamalai

Benjamin Premkumar

1-0081-1569281509 MULTI-CONDITIONAL E-CASH WITH TRANSFERABILITY 381

YingLi, Lu-Sheng Chen

1-0082-1569281623 A METHOD FOR TOPOLOGY CONFORMANCE TESTS UNDER 386

LOGICAL CONSTRAINTS

Jianwu Zhang, GuoaiXu, Yixian Yang, Shize Guo

1-0083-1569281633 ANEWAPPROACHFOR IMAGE RETRIEVAL WITH INTEGRATED 391

EUCLIDEAN DISTANCE AND ROTATIONAL CORRELATION

Jianfeng Wang Xiaorong Zhao

1-0084-1569281649 THE CHARACTERIZATIONS OF BINARY VECTOR-OUTPUT 396

PLATEAUED FUNCTIONS

Tinghai Yue

1-0085-1569281659 A CONSTRUCTION OF BINARY VECTOR-OUTPUT PLATEAUED 401

FUNCTIONS

Tinghai Yue

1-0086-1569281781 A NEW APPROACH TO NULL SPACE-BASED NOISE SIGNAL 406

GENERATION FOR SECURE WIRELESS COMMUNICATIONS IN

TRANSMIT-RECEIVE DIVERSITY SYSTEMS

Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, and Hamid Sharif

1-0087-1569281787 LOW COMPLEXITY VIDEO WATERMARKING ALGORITHM BY 411

EXPLOITING CAVLC IN H.264/AVC

Da-wen Xu, Rang-ding WANG, Ji-cheng WA N G

Page 9: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

1-0088-1569281807 THE RESEARCH OF WORM DISTRIBUTED DETECTION

TECHNOLOGYBASED ON NETWORK SECURITY

Tong Xiaojun, Zhao Zhangquan, ShuaiHuimin, Wang Zhu

1-0089-1569281849 A BLIND DIGITAL WATERMARKING FOR COLOR MEDICAL

IMAGES BASED ON PCA

Xinde Sun and Shukui Bo

1-0090-1569281861

1-0091-1569281883

1-0092-1569281973

1-0093-1569281987

1-0094-1569282057

1-0095-1569282083

1-0096-1569282121

1-0097-1569282143

1-0098-1569282163

1-0099-1569282199

1-0100-1569282289

1-0101-1569282291

A SIP DOS FLOODING ATTACK DEFENSE MECHANISM BASED

ON PRIORITY CLASS QUEUE

Wan Xiao-Yu, Zhang Li, Fan Zi-Fu

VLB-VNE: A REGIONALIZED VALIANT LOAD-BALANCING

ALGORITHM IN VIRTUAL NETWORK MAPPING

Fan Yang, Zhen-kai Wang, Jian-ya Chen, Yim-jie Liu

IMPROVING THE PERTURBED QUANTIZATION

STEGANOGRAPHY BY MODIFIED MATRIX ENCODING

Xuexiu Zhu, Weiming Zhang, Jianqing Qi, Jiufen Liu

AN IMPROVED SECURITY AUTHENTICATION MECHANISM FOR

PARLAY/OSAFRAMEWORK BASED ON SSLYTLS

Fan Zi-Fu, Zhang Yi, Wan Xiao-Yu

THE ANALYSIS AND RESEARCH OF SELFISH QUESTION IN P2P

Chang Lulu, GuoChao, HuYongsheng

A MODIFIED MIN-SUM ALGORITHM FOR LOW-DENSITY

PARITY-CHECKCODES

Wei Han, Jianguo Huang, Fangfei Wu

PUBLICKEY CRYPTOSYSTEM BASED ON PERMUTATION

RATIONAL FUNCTION

Pengcheng Wei, Ran Wei, Yingxian Zhu, Xinbo Yang

A NETWORK SECURITY SYSTEM MODELBASED ON FPGA

Bo Zhou,Wei Han, Huafeng Wu

ROBUST WATERMARKING IN MULTIWAVELET DOMAIN BASED

ONAVERAGE SUBIMAGE OF LOW FREQUENCY

Xiaonian Tang and Guijun Man, Jianchun Wang andXiaoyan Tang

BEHAVIOR PROFILING FOR ROBUST ANOMALYDETECTION

Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang

COVERT COMMUNICATION BASED ON WAVEFORM OVERLAY

WITH WEIGHTED FRACTIONAL FOURIER TRANSFORM

SIGNALS

Lin Mei, Xuejun Sha, andNaitong Zhang

IMPROVED UNIDIRECTIONAL CHOSEN-CIPHERTEXT SECURE

PROXYRE-ENCRYPTION

Page 10: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

Zhao Guoan, Fang Liming, Wang Jiandong, Ge Chunpeng, andRen Yongjun

1-0102-1569282307 AN IDENTITY-BASED SECURITY MECHANISM FOR P2P VOIP 481

Hua Jiang, YongxingJia, XianruDu, WeizhiWang

1-0103-1569282313 AN EFFICIENT UNLINKABLE SECRET HANDSHAKE PROTOCOL 486

WITHOUT ROM

Zhao Guoan, Tan Canghai, Ren Yongjun, Fang Liming

1-0104-1569282315 A DISTRIBUTED KEY MANAGEMENT SCHEME BASED ON 491

SGC-PKC FOR P2P NETWORK

Hua Jiang, YongxingJia, Rui Zhang, Shanming Liu

1-0105-1569282399 COMPUTATION AND ANALYSIS OF NODE INTENDING TRUST IN 496

WSNS

Tian Liqin , Lin chuang

1-0106-1569282533 A QUEUING ANALYSIS FOR LOW-RATE DOS ATTACKS AGAINST 500

APPLICATION SERVERS

Xiaodong Xu, Xiao Guo, Shirui Zhu

1-0107-1569282535 SECURING MULTI-TIERED WEB APPLICATIONS 505

George Mathew, XiaojiangDu

1-0108-1569282631 DESIGN AND IMPLEMENTATION OF MULTIPLE 510

CRYPTOGRAPHIC ALGORITHM INTERFACE CIRCUIT BASED

ON SECURE SOC

Luguo ZHANG, Zheng LI, Ruijiao WANG, Shengjun WEN

1-0109-1569282643 MULTI-PARTY CONCURRENT SIGNATURES BASED ON SHORT 515

RING SIGNATURES

WANG Ling-ling

1-0110-1569282653 A COLOR IMAGE WATERMARKING ALGORITHMRESISTANT TO 518

PRINT-SCAN

Chengqing GUO, Gvoai XU, Xinxin NJU, Yixian YANG, Yang LI

1-0111-1569282721 RESEARCH ON THE MULTIHOMING SCHEME IN ALOC/ID SPLIT 522

CONTEXT

Haisheng Jiang, Sidong Zhang

1-0112-1569282765 A CREDIBLE NETWORK INTRUSION DETECTION SYSTEM 528

BASED ON GRID

Shtiying Zhang, Shu/en Liu, Ytie Gao, Jianmei Ge, Limin Wang

1-0113-1569282771 ONE-PASS KEY ESTABLISHMENT FOR ANONYMOUS WIRELESS 533

ROAMING

Yuan Wang, Duncan S. Wong, and Liusheng Huang

1-0114-1569282805 PRIME-BASED MIMIC FUNCTIONS FORTHE IMPLEMENTATION 538

OF COVERT CHANNELS

WESLEYCONNELL, DAN TAMR, MNA GUIRGUIS

Page 11: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

1-0115-1569282813 OBJECTIVE EVALUATION OF SPIDER DETECTION TECHNIQUES

Fan Chunlong, Yu Zhouhua, andXu Lei

1-0116-1569282851 A NEW MODEL OF FORMAL DESIGN SYSTEM OF SECURITY

AUTHENTICATION PROTOCOL

Wang Hui-bin

1-0117-1569282867 SECRET IMAGES SHARING SCHEME USING TWO-VARIABLE

ONE-WAYFUNCTIONS

Todorka ALEXANDROVA, Yoshiaki SUZUKI, Kan OKUBO, and Norio

TAGAWA

1-0118-1569282883 EFFICIENT AND PROVABLY SECURE CERTIFICATELESS

SIGNCRYPTION FROM BILINEAR MAPS

Wenjian Xie and Zhang Zhang

1-0119-1569283037 TRUST OPPORTUNISTIC ROUTING PROTOCOL IN MULTI-HOP

WIRELESS NETWORKS

WangBo, Huang Chitanhe, Yang Wenzhong, WangTong

1-0120-1569283069 RESEARCH ON RFID SECURITY PROTOCOL BASED ON

GROUPED TAGS AND RE-ENCRYPTION SCHEME

Chunhui Piao, ZhenjiangFan, ChunyanYang, XufangHan

1-0121-1569283079 PERIODIC SEQUENCE IN NETFLOW RECOGNIZING

ALGORITHM

He Tao, Zhong Hao

1-0122-1569283081 RAILWAY PASSENGER DYNAMIC E-BUSINESS BASED ON WEB

SERVICES AND RFID

JingdongSUN, Yibin ZHANG

1-0123-1569283541 HIGH-SPEED ARCHITECTURES FOR GHASH BASED ON

EFFICIENT BIT-PARALLEL MULTIPLIERS

Jimei Wang, Guochu Shou, Yihong Hu, Zhigang Guo

1-0124-1569283565 GROWTH CUSTOMER INFORMATION MINING ANALYSIS WITH

ASSOCIATION RULES IN ON LINE FINANCIAL WEB SITE

Dai Zhi-min, GuoLu

1-0125-1569284323 APPLICATION OF BP NEURAL NETWORK IN WIRELESS

NETWORK SECURITY EVALUATION

JianxinFui Lianfen Huang, YanYao

1-0126-1569285493 ON THE PRIVACY PROTECTION IN PUBLISH/SUBSCRIBE

SYSTEMS

Weifeng Chen, Jianchun Jiang, Nancy Skocik

1-0127-1569286113 IMPROVEMENT OF ONE ESCROW-FREE IDENTITY-BASED

SIGNATURE

LihuaLiu, Zhengjun Cao

Page 12: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

1-0128-1569286241 COMBATING SELF-LEARNING WORMS BY USING PREDATORS 607

Fangwei Wang, Yunkcti Zhang, Honggang Guo, and Changguang Wang

1-0129-1569286467 COMPRESSED VIDEO COPY DETECTION BASED ON TEXTURE 612

ANALYSIS

Zhijie Zhang, Fang Yuan

1-0130-1569287O75 PREDICTION MODEL OF NETWORK SECURITY SITUATION 616

BASED ON REGRESSION ANALYSIS

XiaWei-wei, Wang Hai-feng

1-0131-1569287361 A SOFTWARE VULNERABILITY ANALYSIS ENVIRONMENT 620

BASED ON VIRTUALIZATION TECHNOLOGY

WangChunleit WenYan, DaiYiqi

1-0132-1569287749 THE STUDY OF WATERMARKING ALGORITHM FOR VECTOR 625

GEOSPATIAL DATA BASED ON THE PHASE OF DFT

DeheXu, Qisheng Wang

1-0133-1569287841 A GENERIC DATA MODEL WITH A DECOMPOSITION 630

OPERATION FOR DRM INTEROPERABILITY

WenhuiLu, Zheying Zhang, Jyrki Nummenmaa

1-0134-1569287919 AN ATTACK-RESILIENT GRID AUDITING INFRASTRUCTURE 635

Christopher Kum, Jan Wiebelitz and Matthew Smith

1-0135-1569288299 COUNT OF ANNIHILATORS OF BOOLEAN FUNCTIONS WITH 640

GIVEN ALGEBRAIC IMMUNITY

YusongDU, DingyiPEI

1-0136-1569288411 AN IDENTITY-BASED SECURITY INFRASTRUCTURE FOR CLOUD 644

ENVIRONMENTS

Christian Schridde, Tim Dornemann, Ernst Juhnke, Bernd Freisleben,

Matthew Smith

1-0137-1569288419 ELLIPTIC CURVE CRYPTOGRAPHY BASED MUTUAL 650

AUTHENTICATION PROTOCOL FOR LOW

COMPUTATIONAL CAPACITY RFID SYSTEMS - PERFORMANCE

ANALYSIS BY SIMULATIONS

Gyozo Godor, Norbert Giczi, Sandor Imre Dr.

1-0138-1569288509 FAST-FLUX ATTACK NETWORK DDENTIFICATION BASED ON 658

AGENT LIFESPAN

Sheng Yu, Shijie Zhou, and Sha Wang

1-0139-1569288571 RESEARCH ON A SECURE MOBILE PAYMENT BASED ON 663

MULTI-AGENTS

Wang Qiongqiong, Xin Mingjun

1-0140-1569288575 APPLICATION LEVEL NETWORK ACCESS CONTROL SYSTEM 667

BASED ONTNC ARCHITECTURE FOR ENTERPRISE NETWORK

Zhen Chen, Fa-Chao Deng, An-An Luo, Xin Jiang, Guo-Dong Li, Run-hua

Page 13: 2010 IEEE International ; Vol. 1 · 1-0013-1569279627 capacity criterion-based power loading for 54 underwater acoustic ofdm system with limited feedback xiaopenghuang 1-0014-1569280371

Zhang, ChuangLin

1-0141-1569288595 AASC: ANONYMIZING NETWORK ADDRESSES BASED ON 672

SUBNET CLUSTERING

Ti Tang, Yuanyuan Wu, Quart Zhou

1-0142-1569288615 BIOMETRIC VERIFICATION USING HAND VEIN-PATTERNS 677

Xue Yuan

1-0143-1569288649 AUTONOMOUS AGENT BASED INTRUSION DETECTION IN 682

VIRTUALCOMPUTING ENVIRONMENT

Alex K. Ohoussov, Hai Jin, Deqing Zou, Feng Zhao, Guofu Xiang, Ge Cheng

1-0144-1569288659 RESEARCH ON A BEHAVIOR-BASED ACTIVE CONTROLLABLE 687

DEFENSE MODELAND ITS APPLICATION

Zhitao Guan, Jietao He, Kehe Wu, Shuai Yuan

1-0145-1569288711 ANALYSIS OF ATTACK MODELS VIA UNIFIED MODELING 692

LANGUAGE IN WIRELESS SENSOR NETWORKS: A SURVEY

STUDY

Sunghyuck Hong, Sunho Lim

1-0146-1569288777 WIDEBAND AUDIO OVER NARROWBAND BASED ON 697

DIGITALWATERMARKING

Zhenyi Lao andJiying Zhao

1-0147-1569288781 A KEY-CODE WATERMARKING ALGORITHM FOR VIDEO 702

CONTENT PROTECTION

Myoung-Hoon Lee, Vincent So, and Jiying Zhao

1-0148-1569288783 NETWORK PEFORMANCE EVALUATION OF ROUTERS IN 707

IPV4/IPV6 ENVIRONMENT

Shaneel Narayan (Member IEEE), Shailendra S. Sodhi, Paula R. Lutui,

Kaushik J. Vijayakumar

1-0149-1569288791 INTRUSION DETECTION OF SINKHOLE ATTACKS IN 711

LARGE-SCALE WIRELESS SENSORNETWORKS

Changlong Chen, Min Song, and George Hsieh

1-0150-1569296004 TRUST MANAGEMENT FOR MOBILE AGENT SYSTEM BASED ON 717

TRUSTED COMPUTING PLATFORMS

Zhidong Shen, Xiaoping Wu, Jing Zhan

AUTHOR INDEX