Ebook: Computational Intelligence and Security: International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II
- Tags: Artificial Intelligence (incl. Robotics), Information Storage and Retrieval, Information Systems Applications (incl.Internet), Computation by Abstract Devices, Algorithm Analysis and Problem Complexity, Management of Computing and Inform
- Series: Lecture Notes in Computer Science 3802
- Year: 2005
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005.
The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005.
The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
Content:
Front Matter....Pages -
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings....Pages 1-8
FMS Attack-Resistant WEP Implementation Is Still Broken....Pages 9-16
Design of a New Kind of Encryption Kernel Based on RSA Algorithm....Pages 17-26
On the Security of Condorcet Electronic Voting Scheme....Pages 27-32
Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field....Pages 33-42
Cryptanalysis of a Cellular Automata Cryptosystem....Pages 43-48
A New Conceptual Framework Within Information Privacy: Meta Privacy....Pages 49-54
Error Oracle Attacks on Several Modes of Operation....Pages 55-61
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences....Pages 62-67
On the Construction of Some Optimal Polynomial Codes....Pages 68-73
Perceptual Hashing of Video Content Based on Differential Block Similarity....Pages 74-79
Secure Software Smartcard Resilient to Capture....Pages 80-85
Revised Fischlin’s (Blind) Signature Schemes....Pages 86-95
Certificateless Threshold Signature Schemes....Pages 96-103
An Efficient Certificateless Signature Scheme....Pages 104-109
ID-Based Restrictive Partially Blind Signatures....Pages 110-116
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing....Pages 117-124
On Anonymity of Group Signatures....Pages 125-130
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols....Pages 131-136
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks....Pages 137-142
On the Security of Some Password-Based Key Agreement Schemes....Pages 143-148
A New Group Rekeying Method in Secure Multicast....Pages 149-154
Pairing-Based Provable Blind Signature Scheme Without Random Oracles....Pages 155-160
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings....Pages 161-166
An Identity-Based Threshold Signcryption Scheme with Semantic Security....Pages 167-172
A Token-Based Single Sign-On Protocol....Pages 173-179
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing....Pages 180-185
Efficient Compilers for Authenticated Group Key Exchange....Pages 186-191
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys....Pages 192-197
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks....Pages 198-203
A New User-Habit Based Approach for Early Warning of Worms....Pages 204-211
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM....Pages 212-219
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems....Pages 220-227
Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems....Pages 228-235
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection....Pages 236-243
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics....Pages 244-251
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services....Pages 252-259
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain....Pages 260-266
Measuring the Histogram Feature Vector for Anomaly Network Traffic....Pages 267-272
Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme....Pages 273-278
Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model....Pages 279-284
Reducing Worm Detection Time and False Alarm in Virus Throttling....Pages 285-290
Protection Against Format String Attacks by Binary Rewriting....Pages 291-296
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function....Pages 297-302
Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information....Pages 303-308
Parallel Optimization Technology for Backbone Network Intrusion Detection System....Pages 309-314
Attack Scenario Construction Based on Rule and Fuzzy Clustering....Pages 315-321
A CBR Engine Adapting to IDS....Pages 322-327
Application of Fuzzy Logic for Distributed Intrusion Detection....Pages 328-333
Dynamic Access Control for Pervasive Grid Applications....Pages 334-339
On the Security of the Canetti-Krawczyk Model....Pages 340-347
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks....Pages 348-355
A Variant of Poly1305 MAC and Its Security Proof....Pages 356-363
Covert Channel Identification Founded on Information Flow Analysis....Pages 364-374
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems....Pages 375-380
Design and Implementation of a Parallel Crypto Server....Pages 381-387
Survivability Computation of Networked Information Systems....Pages 388-397
Assessment of Windows System Security Using Vulnerability Relationship Graph....Pages 398-406
A New (t, n)-Threshold Multi-secret Sharing Scheme....Pages 407-414
An Efficient Message Broadcast Authentication Scheme for Sensor Networks....Pages 415-420
Digital Image Authentication Based on Error-Correction Codes....Pages 421-426
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e....Pages 427-432
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme....Pages 433-438
Building Security Requirements Using State Transition Diagram at Security Threat Location....Pages 439-444
Study on Security iSCSI Based on SSH....Pages 445-450
A Scheduling Algorithm Based on a Trust Mechanism in Grid....Pages 451-456
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device....Pages 457-462
Worm Propagation Modeling and Analysis on Network....Pages 463-468
An Extensible AAA Infrastructure for IPv6....Pages 469-475
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i....Pages 476-481
A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks....Pages 482-487
A Virtual Bridge Certificate Authority Model....Pages 488-493
Weak Signals in Information Security Management....Pages 494-499
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems....Pages 500-507
Methodology of Quantitative Risk Assessment for Information System Security....Pages 508-517
A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme....Pages 518-525
Improvement on an Optimized Protocol for Mobile Network Authentication and Security....Pages 526-531
Neural Network Based Flow Forecast and Diagnosis....Pages 532-537
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach....Pages 538-541
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function....Pages 542-547
Topology-Based Macroscopical Response and Control Technology for Network Security Event....Pages 548-553
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords....Pages 554-559
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients....Pages 560-566
An Image Steganography Using Pixel Characteristics....Pages 567-572
Alternatives for Multimedia Messaging System Steganography....Pages 573-580
Error Concealment for Video Transmission Based on Watermarking....Pages 581-588
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images....Pages 589-596
An Image Hiding Algorithm Based on Bit Plane....Pages 597-604
A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack....Pages 605-610
Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video....Pages 611-616
Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning....Pages 617-622
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems....Pages 623-628
An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis....Pages 629-634
A Digital Watermarking Technique Based on Wavelet Packages....Pages 635-642
A Spectral Images Digital Watermarking Algorithm....Pages 643-648
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks....Pages 649-654
The Study of RED Algorithm Used Multicast Router Based Buffer Management....Pages 655-660
Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection....Pages 661-668
MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management....Pages 669-678
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm....Pages 679-686
On a Novel Methodology for Estimating Available Bandwidth Along Network Paths....Pages 687-694
A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows....Pages 695-702
Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment....Pages 703-710
An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema....Pages 711-718
A Fuzzy Integral Method to Merge Search Engine Results on Web....Pages 719-724
The Next Generation PARLAY X with QoS/QoE....Pages 725-730
A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network....Pages 731-736
Introduction of Knowledge Management System for Technical Support in Construction Industries....Pages 737-742
An Event Correlation Approach Based on the Combination of IHU and Codebook....Pages 743-748
Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform....Pages 749-756
A Dynamic Face and Fingerprint Fusion System for Identity Authentication....Pages 757-763
Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique....Pages 764-771
Binarized Revocable Biometrics in Face Recognition....Pages 772-779
Short Critical Area Computational Method Using Mathematical Morphology....Pages 780-787
A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization....Pages 788-795
MFCC and SVM Based Recognition of Chinese Vowels....Pages 796-803
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain....Pages 804-811
Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing....Pages 812-819
Component-Based Online Learning for Face Detection and Verification....Pages 820-825
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression....Pages 826-831
Modified EZW Coding for Stereo Residual....Pages 832-837
Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks....Pages 838-844
Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264....Pages 845-850
Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation....Pages 851-856
Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries....Pages 857-862
Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow....Pages 863-868
Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization....Pages 869-874
Image Classification and Delineation of Fragments....Pages 875-880
A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization....Pages 881-886
A General Image Based Nematode Identification System Design....Pages 887-892
A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems....Pages 893-898
New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain....Pages 899-904
Line Segments and Dominate Points Detection Based on Hough Transform....Pages 905-910
The Study of the Auto Color Image Segmentation....Pages 911-916
Regularized Image Restoration by Means of Fusion for Digital Auto Focusing....Pages 917-922
Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection....Pages 923-928
Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation....Pages 929-934
SUSAN Window Based Cost Calculation for Fast Stereo Matching....Pages 935-940
An Efficient Adaptive De-blocking Algorithm....Pages 941-946
Facial Features Location by Analytic Boosted Cascade Detector....Pages 947-952
New Approach for Segmentation and Pattern Recognition of Jacquard Images....Pages 953-958
Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint....Pages 959-964
Principle of Image Encrypting Algorithm Based on Magic Cube Transformation....Pages 965-970
A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering....Pages 971-976
Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy....Pages 977-982
Incremental Fuzzy Decision Tree-Based Network Forensic System....Pages 983-988
Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay....Pages 989-994
Using Concept Taxonomies for Effective Tree Induction....Pages 995-1002
A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities....Pages 1003-1010
Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering....Pages 1011-1016
A Private and Efficient Mobile Payment Protocol....Pages 1017-1024
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce....Pages 1025-1029
An Efficient Control Method for Elevator Group Control System....Pages 1030-1035
Next Generation Military Communication Systems Architecture....Pages 1036-1041
Early Warning for Network Worms....Pages 1042-1047
Skeleton Representation of Character Based on Multiscale Approach....Pages 1048-1053
Channel Equalization Based on Two Weights Neural Network....Pages 1054-1059
Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set....Pages 1060-1067
Ring-Based Anonymous Fingerprinting Scheme....Pages 1068-1073
Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code....Pages 1074-1079
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem....Pages 1080-1085
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset....Pages 1086-1091
Design and Implementation of Crypto Co-processor and Its Application to Security Systems....Pages 1092-1097
Continuous Speech Research Based on HyperSausage Neuron....Pages 1098-1103
Variable-Rate Channel Coding for Space-Time Coded MIMO System....Pages 1104-1109
A New Watermarking Method Based on DWT....Pages 1110-1115
Efficient Point Rendering Method Using Sequential Level-of-Detail....Pages 1116-1121
Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets....Pages 1122-1126
Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus....Pages 1127-1133
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel....Pages 1134-1139
Back Matter....Pages 1140-1148
....Pages 1149-1156