The Community for Technology Leaders
Parallel and Distributed Processing Symposium, International (2005)
Denver, Colorado
Apr. 4, 2005 to Apr. 8, 2005
ISSN: 1530-2075
ISBN: 0-7695-2312-9
TABLE OF CONTENTS
International Workshop on Security in Systems and Networks - SSN

Defending Distributed Systems Against Malicious Intrusions and Network Anomalies (Abstract)

Kai Hwang , University of Southern California, Los Angeles
Ying Chen , University of Southern California, Los Angeles
Hua Liu , University of Southern California, Los Angeles
pp. 286a

MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network (Abstract)

Duminda Wijesekera , George Mason University, Fairfax, VA
Sushil Jajodia , George Mason University, Fairfax, VA
Hemant Sengar , George Mason University, Fairfax, VA
pp. 286b

A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes (Abstract)

Rafael Mar? , University of Murcia, Spain
Gabriel L?pez , University of Murcia, Spain
Antonio F. G?mez , University of Murcia, Spain
Oscar C?novas , University of Murcia, Spain
pp. 287a

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation (Abstract)

Bernhard Plattner , Swiss Federal Institute of Technology, ETH Zurich
Thomas D?bendorfer , Swiss Federal Institute of Technology, ETH Zurich
Matthias Bossardt , Swiss Federal Institute of Technology, ETH Zurich
pp. 287b

Secure and Efficient Key Management in Mobile Ad Hoc Networks (Abstract)

Bing Wu , Florida Atlantic University, Boca Raton
Eduardo B. Fernandez , Florida Atlantic University, Boca Raton
Spyros Magliveras , Florida Atlantic University, Boca Raton
Jie Wu , Florida Atlantic University, Boca Raton
pp. 288a

Certified E-Mail Delivery with DSA Receipts (Abstract)

Qi Shi , Liverpool John Moores University
Aleksandra Nenadic , University of Manchester
Ning Zhang , University of Manchester
Carole Goble , University of Manchester
pp. 288b

Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach (Abstract)

Lijun Qian , Prairie View A&M University, Texas
Xiangfang Li , Rutgers University, Piscataway, NJ
Ning Song , Prairie View A&M University, Texas
pp. 289a

A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments (Abstract)

Cheng-Zhong Xu , Wayne State University, Detroit, MI
Song Fu , Wayne State University, Detroit, MI
pp. 289b

On the Impact of IPsec on Interactive Communications (Abstract)

Andreas Hess , Technical University Berlin
Jirka Klaue , Technical University Berlin
pp. 291a

A Method of Security Measurement of the Network Data Transmission (Abstract)

Baoliang Zhang , Huazhong University of Science and Technology
Xiang Chen , Huazhong University of Science and Technology
Hanping Hu , Huazhong University of Science and Technology
Wenxuan Guo , Huazhong University of Science and Technology
pp. 291b

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks (Abstract)

Ilias Stavrakis , Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece
Vasilios A. Siris , Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece
pp. 292a

Tabu Marking Scheme for IP Traceback (Abstract)

Miao Ma , Institute for Infocomm Research, Singapore
pp. 292b

DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Scheme (Abstract)

N. Zhang , University of Manchester, UK
D. Edwards , University of Manchester, UK
O. Bamasak , University of Manchester, UK
pp. 293a

Speculative Security Checks in Sandboxing Systems (Abstract)

Koichi Onoue , The University of Tokyo
Yoshihiro Oyama , The University of Tokyo
Akinori Yonezawa , The University of Tokyo
pp. 293b

An Improved Algorithm for uP + vQ on a Family of Elliptic Curves (Abstract)

Zhang YaJuan , Information Engineering University, China
Zhu YueFei , Information Engineering University, China
Kuang BaiJie , Information Engineering University, China
pp. 294
98 ms
(Ver )