mass2009


Home

Welcome

Technical Program

Keynotes

Workshops

     InVANET

     MeshTech

     TSP

     WAASN

     WiNA

     WSNS

Search Proceedings

Author Index

Committee

About MASS

CD Tech Support

 

 

TSP Workshop

 

Click here for Welcome from Workshop Chairs and list of organizing committee

 

Detecting Privacy Infractions in Applications: A Framework and Methodology
Michael Smit, Kelly Lyons, Michael McAllister, Jacob Slonim

Extended Attribute Based Encryption for Private Information Retrieval
Yinan Shan, Zhenfu Cao

A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus
Cong Zheng, Lansheng Han, Jihang Ye, Mengsong Zou, Qiwen Liu

A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques
Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko

Security Considerations on Pervasive Real-time Collaboration
Fuwen Liu, Hartmut Koenig

A Strategy-proof Trust Mechanism for Pervasive Computing Environments
Zhiqiang Wei, Wei Zhou, Mijun Kang, Michael Collins, paddy nixon

Computational Model for Trust Management in RFID Supply Chains
Manmeet Mahinderjit SINGH, Xue Li

A New High-Performance Approach for Offline Replacement Attack Prevention in Trusted Clients
Hossein Rezaei Ghaleh, Siavash Khorsandi

A-Kad: an anonymous P2P protocol based on Kad network
YongQing Ni, DaeHun Nyang, Xu Wang

Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks
Anoosha Prathapani, Lakshmi Santhanam, Dharma P Agrawal

A Directed Acyclic Graph based Detection for RBAC Based Secure
Xiyuan Chen, Miaoliang Zhu

RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems
Minh-Triet Tran, Anh-Duc Duong, Isao Echizen

Towards Neutral Trust Management Framework in Unstructured Networks
Ruidong Li, Jie Li

Strong authentication with mobile phone as security token
Van Thanh Do, Ivar Jørstad, Tore Jønvik, Van Thuan Do

Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity
Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan

Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method'
Lina Wang, Yuntao Yue, Chi Guo, Xiaoying Zhang

Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time
Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård

An Efficient Geographic Location-based Security Mechanism for Vehicular Adhoc Networks
Gongjun Yan, Stephan Olariu

Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware
Habtamu Abie

Strengthening Class1 Gen2 RFID Tags
Jihoon Cho

Improving the Reliability of Embedded Systems with Cache and SPM
Meng Wang, Yi Wang, Duo Liu, Zili Shao

A Heuristic Policy-based System Call Interposition in Dynamic Binary Translation
Deen Zheng, Zhengwei Qi, Alei Liang, Hongbo Yang, Haibing Guan, Liang Liu

Pervasive Service Access with SIM-based VPN
Van Thanh Do, Ivar Jørstad, Tor Anders Johansen, Elias Bakken, Van Thuan Do

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol
Fang Qi, Zhe Tang, Guojun Wang, Jie Wu

CENDA-Camouflage Event Based Malicious Node Detection Architecture
Kanthakumar Pongaliur, Li Xiao, Alex Liu

A Low-Frequency RFID to Challenge Security and Privacy Concerns
Mohammed Benaissa, Tim Good

Secure localization and location verification in wireless sensor networks
Yingpei Zeng, Jiannong Cao, Jue Hong, Li Xie

 

spacer


Produced by X-CD Technologies