The Community for Technology Leaders
Parallel and Distributed Processing Symposium, International (2005)
Denver, Colorado
Apr. 4, 2005 to Apr. 8, 2005
ISSN: 1530-2075
ISBN: 0-7695-2312-9
TABLE OF CONTENTS
International Workshop on Security in Systems and Networks - SSN

Defending Distributed Systems Against Malicious Intrusions and Network Anomalies (Abstract)

Kai Hwang , University of Southern California, Los Angeles
Ying Chen , University of Southern California, Los Angeles
Hua Liu , University of Southern California, Los Angeles
pp. 286a

MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network (Abstract)

Hemant Sengar , George Mason University, Fairfax, VA
Duminda Wijesekera , George Mason University, Fairfax, VA
Sushil Jajodia , George Mason University, Fairfax, VA
pp. 286b

A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes (Abstract)

Gabriel L?pez , University of Murcia, Spain
Antonio F. G?mez , University of Murcia, Spain
Rafael Mar? , University of Murcia, Spain
Oscar C?novas , University of Murcia, Spain
pp. 287a

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation (Abstract)

Thomas D?bendorfer , Swiss Federal Institute of Technology, ETH Zurich
Matthias Bossardt , Swiss Federal Institute of Technology, ETH Zurich
Bernhard Plattner , Swiss Federal Institute of Technology, ETH Zurich
pp. 287b

Secure and Efficient Key Management in Mobile Ad Hoc Networks (Abstract)

Bing Wu , Florida Atlantic University, Boca Raton
Jie Wu , Florida Atlantic University, Boca Raton
Eduardo B. Fernandez , Florida Atlantic University, Boca Raton
Spyros Magliveras , Florida Atlantic University, Boca Raton
pp. 288a

Certified E-Mail Delivery with DSA Receipts (Abstract)

Aleksandra Nenadic , University of Manchester
Ning Zhang , University of Manchester
Qi Shi , Liverpool John Moores University
Carole Goble , University of Manchester
pp. 288b

Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach (Abstract)

Ning Song , Prairie View A&M University, Texas
Lijun Qian , Prairie View A&M University, Texas
Xiangfang Li , Rutgers University, Piscataway, NJ
pp. 289a

A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments (Abstract)

Song Fu , Wayne State University, Detroit, MI
Cheng-Zhong Xu , Wayne State University, Detroit, MI
pp. 289b

On the Impact of IPsec on Interactive Communications (Abstract)

Jirka Klaue , Technical University Berlin
Andreas Hess , Technical University Berlin
pp. 291a

A Method of Security Measurement of the Network Data Transmission (Abstract)

Hanping Hu , Huazhong University of Science and Technology
Wenxuan Guo , Huazhong University of Science and Technology
Baoliang Zhang , Huazhong University of Science and Technology
Xiang Chen , Huazhong University of Science and Technology
pp. 291b

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks (Abstract)

Vasilios A. Siris , Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece
Ilias Stavrakis , Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece
pp. 292a

Tabu Marking Scheme for IP Traceback (Abstract)

Miao Ma , Institute for Infocomm Research, Singapore
pp. 292b

DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Scheme (Abstract)

O. Bamasak , University of Manchester, UK
N. Zhang , University of Manchester, UK
D. Edwards , University of Manchester, UK
pp. 293a

Speculative Security Checks in Sandboxing Systems (Abstract)

Yoshihiro Oyama , The University of Tokyo
Koichi Onoue , The University of Tokyo
Akinori Yonezawa , The University of Tokyo
pp. 293b

An Improved Algorithm for uP + vQ on a Family of Elliptic Curves (Abstract)

Zhu YueFei , Information Engineering University, China
Kuang BaiJie , Information Engineering University, China
Zhang YaJuan , Information Engineering University, China
pp. 294
82 ms
(Ver 3.3 (11022016))