+ All Categories
Home > Documents > UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet...

UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet...

Date post: 20-Sep-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
12
2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2011) Seoul, South Korea 30 June-2 July 2011 Editors: Ilsun You Feilong Tang Leonard Barolli Fatos Xhafa IEEE IEEE Catalog Number: CFP1158N-PRT ISBN: 978-1-61284-733-7
Transcript
Page 1: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

2011 Fifth International

Conference on Innovative Mobile

and Internet Services in

Ubiquitous Computing

(IMIS 2011)

Seoul, South Korea

30 June-2 July 2011

Editors:

Ilsun You Feilong Tang

Leonard Barolli Fatos Xhafa

IEEE IEEE Catalog Number: CFP1158N-PRT

ISBN: 978-1-61284-733-7

Page 2: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

2011 Fifth International

Conference on Innovative

Mobile and Internet Services

in Ubiquitous Computing

IMIS2011

Table of Contents

Message from IMIS 2011 General Co-chairs xvi

Message from IMIS 2011 Program Committee Co-chairs xvii

Message from IMIS 2011 International Conference Workshop

Co-chairs xviii

IMIS 2011 Organizing Committee xix

IMIS 2011 Track Area Chairs xx

IMIS 2011 Reviewers xxv

IMIS 2011 Keynote Talk xxviii

Message from ACTICS 2011 International Workshop

Organizers xxix

ACTICS 2011 Organizing Committee xxx

ACTICS 2011 Reviewers xxxi

Message from FIMIS 2011 Workshop Co-chairs xxxii

FIMIS 2011 Organizing Committee xxxiii

FIMIS 2011 Reviewers xxxiv

Message from FINGNet 2011 International Workshop

Organizers xxxv

FINGNet 2011 Organizing Committee xxxvi

FINGNet 2011 Reviewers xxxvii

Message from IFSN 2011 International Workshop Organizers xxxviii

IFSN 2011 Organizing Committee xxxix

IFSN 2011 Reviewers xl

Message from ITAUC 2011 International Workshop

Organizers xii

ITAUC 2011 Organizing Committee. xm

V

Page 3: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

ITAUC 2011 Reviewers xiiii

Message from MoMoPE 2011 International Workshop

Organizers xiiv

MoMoPE 2011 Organizing Committee xlv

MoMoPE 2011 Reviewers xlvi

Message from MCNCS 2011 International Workshop

Organizers xivii

MCNCS 2011 Organizing Committee xiviii

MCNCS 2011 Reviewers xMx

Message from WAIS 2011 International Workshop

Organizers i

WAIS 2011 Organizing Committee H

WAIS 2011 Reviewers Hi

Selected Area: Practical Security on Internet Services I

The Design of Video Door Phone and Control System for Home Secure

Applications 1

Ching-Lung Chang andHart-Yu Tsai

Reversability Assessment on Secure USB Memories 6

Kyungroul Lee, Sitha Pho, andKangbin Yim

Keyboard Security: A Technological Review 9

Kyungroul Lee and Kangbin Yim

Architecture to Support Heterogeneous Devices for Video Surveillance

System 16

MohammadA. Mikki, Kyungroul Lee, Wansoo Kim, andKangbin Yim

Cloud Computing and Service Management I

An Online Migration Environment for Executing Mobile Applications on

the Cloud 20

Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh, Chen-Pang Lee, and Yi-Hsiang Huang

A Heuristic Approach for Scalability of Multi-tiers Web Application in Clouds ...28

Ruiqing Chi, Zhuzhong Qian, and Sanglu Lu

Performability Analysis of laaS Cloud 36

Ji Ho Kim, Sang Mm Lee, Dong SeongKim, andJong Sou Park

Towards Multi-criteria Cloud Service Selection 44

Zia ur Rehman, Farookh K. Hussain, and Omar K. Hussain

vi

Page 4: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Internet, Wireless and Mobile Networks for UPC I

An IP Passing Protocol for Vehicular Ad Hoc Networks with Network

Fragmentations 49

Yuh-Shyan Chen, Chih-Shun Hsu, and Wei-Han Yi

NTC: Towards Efficient Network Coding in Delay Tolerant Networks 57

Baokang Zhao, Ziming Song, Jinshu Su, Wei Peng, and Qiaolin Hu

Context and Location-Aware Computing

Contexts-Management Strategy in Considering the Security in Urban

Computing Based on Urban Design 65

Hoon Ko, Goreti Marreiros, Kyung-jin An, Zita Vale, Tai-hoon Kim,

andJong-Myoung Choi

Efficient Object Localization for Query-by-Subregion 73

Yong-Hwan Lee, Bonam Kim, and Heung-Jun Kim

Short-Term Prediction-Based Optimistic Object Tracking Strategy in Wireless

Sensor Networks 78

Jenq Muh Hsu, Chao Chun Chen, and Chia Chi Li

Selected Area: Practical Security on Internet Services II

Adaptive DDoS Detector Design Using Fast Entropy Computation Method 86

Giseop No and Ilkyeun Ra

A Resource Perspective to Wireless Sensor Network Security 94

Venkatesh Kannan and Sahena Ahmed

ACSP: A Novel Security Protocol against Counting Attack for UHF RFID

Systems 100

Ce Chen, Zhuzhong Qian, Ilsun You, Jue Hong, andSanglu Lu

Cloud Computing and Service Management II

"Variated Availability" Approach to the Services Manageable Delivering 106

Natalia Kryvinska, Christine Strauss, and Peter Zinterhof

A Formal Model for Dynamic Service Updates in Pervasive Computing 114

SiqiDu, Linpeng Huang, andJunqing Chen

An Effective Deadlock Prevention Mechanism for Distributed Transaction

Management 120

Lin Lou, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen, andLi Li

vii

Page 5: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Internet, Wireless and Mobile Networks for UPC II

A Case for Real-World Smart Environments: The Development of a Remote

Autonomous Energy Aware Monitoring System Using Next Generation

Technologies 128

Nicholas McLauchlan and Nik Bessis

"Memoxo" - Browser-Based Prototype for the Audio/Video Messages

Recording 136

Markus Hockner, RudolfHartjes, Christine Strauss, and Natalia Kryvinska

Embedded Systems and Wearable Computers

Task Optimization Based on CPU Pipeline Technique in Multicore System 143

Bo Wang, Yongwei Wu, and Weimin Zheng

Display Verification IP Core Design Based on Star-Extraction

and Star-Recognition Image Processing on FPGA 151

Linyang Sheng, Jingbo Shao, Min Xu, and Yuanquan Cui

Trying Linear Network Coding on a Network Flow Processor 156

Peng Cao, Long Zheng, Yanchao Lu, Feilong Tang, Ilsun You, and Minyi Guo

A Formalization of an Emulation Based Co-designed Virtual Machine 164

Wei Chen, Weixia Xu, Zhiying Wang, Qiang Dou, Yongwen Wang, Baokang Zhao,

and Baosheng Wang

Selected Area: Practical Security on Internet Services III

Secure Information Management Protocol Based on Linguistic Sharing

Techniques 169

Marek R. Ogiela and Urszula Ogiela

Combining Static and Dynamic Analysis to Discover Software Vulnerabilities 175

Ruoyu Zhang, Shiqiu Huang, Zhengwei Qi, andHaibin Guan

Data Management in Pervasive Systems

Semantic Analysis Processes in UBIAS Systems for Cognitive Data

Interpretation 182

Lidia Ogiela and Marek R. Ogiela

Information Retrieval Techniques to Grasp User Intention in Pervasive

Computing Environment 186

Myunggwon Hwang, Pankoo Kim, andDongjin Choi

Improvements on Sequential Minimal Optimization Algorithm for Support

Vector Machine Based on Semi-sparse Algorithm 192

Xiaopeng Yang, Hu Guan, Feilong Tang, llsun You, Minyi Guo, and Yao Shen

viii

Page 6: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Security, Trust and Privacy

Universal, Fast Method for iPad Forensics Imaging via USB Adapter 200

Luis Gomez-Miralles andJoan Arnedo-Moreno

Trust-Driven Policy Enforcement through Gate Automata 208

Gabriele Costa and Ilaria Matteucci

DDoS Attacks Detection Using GA Based Optimized Traffic Matrix 216

Je Hak Lee, Dong Seong Kim, Sang Min Lee, andJong Sou Park

Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding

Algorithms with Minimum Error 221

Rong-Jian Chen, Jui-Lin Lai, and Shi-Jinn Horng

Knowledge Cities and Disaster Recovery

Buildings and Crowds: Forming Smart Cities for More Effective Disaster

Management 229

Eleana Asimakopoulou andNik Bessis

ICTs and Effective Communication Strategies: Specific Needs of Information

before, during and after Disasters : 235

Zemp Helena

Modeling, Simulation and Performance in UPC

Ubiquitous Computing and Distributed Agent-Based Simulation 241

B.G.W. Craenen andG.K. Theodoropoulos

A PCA-based Approach to Modeling Location Update and Pagingfor Location Area Planning 248

Jingbo Sun, Yue Wang, Jian Yuan, andXiuming Shan

Circuit Emulation Services over SCTP 253

Shiwei Hu, Minyi Guo, Feilong Tang, Jingyu Zhou, and Yao Shen

Session 1: Cognitive Radio Systems, Sensors and Applications (ACTICS 2011)

Channel Allocation for a Single Cell Cognitive Radio Network Using Genetic

Algorithm 258

Subhasree Bhattacharjee, Amit Konar, and Atulya K. Nagar

A Proposal of an Application of Life Log to Remote Consultation 265

Yuya Uesugi, Tasuku Yamamoto, Jun Sawamoto, Norihisa Segawa, Eiji Sugino,Takuto Goto, andHiroshi Yajima

ix

Page 7: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Session 2: Protocols and Algorithms (ACTICS 2011)

Effect of Sink Location on Aggregation Based on Degree ofConnectivity

for Wireless Sensor Networks 271

DavidFolue, Foued Melakessou, Houda Labiod, and Thomas Engel

Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol

by Spare Selection 277

BHal Abu Bah- andLeszek Lilien

Session 1: Ubiquitous and Cloud Computing (FIMIS 2011)

A Game-Theoretic Resource Allocation Algorithm Based on Utility in IEEE

802.1 le 283

Li Yishan, Li Yuhong, and Li Tao

Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus

Platform for E-Government Data Center 289

Sok Chvob, Manish Pokharel, andJong Sou Park

Personalized Information Recommendataion Using Hybrid CBR and CSP in

a Ubiquitous Computing Environment 297

Mye Sohn, Hyunwoo Kim, andHyun Jung Lee

Session 2: Mobility Issues in Wireless Networks (FIMIS 2011)

A Novel Mobility Management Mechanism Based on Destination Address

Overwritten and ID/Locator Separation 304

Hon Yunjing, Li Yuhong, and Yu Liang

Secure Mobility Management Scheme for 6L0WPAN ID/Locator Split

Architecture 310

Antonio J. Jara, Leandro Marin, Antonio F. G. Skarmeta, Dhananjay Singh,

Gohel Bakul, andDaeyeoul Kim

Session 1: Architectures and Platforms (FINGNet 2011)

Cost-Optimal Validation Mechanisms and Cheat-Detection for CrowdsourcingPlatforms 316

Matthias Hirth, Tobias Hofifeld, andPhuoc Tran-Gia

Anatomy ofa Crowdsourcing Platform - Using the ExampleofMicroworkers.com 322

Matthias Hirth, Tobias Hofifeld, andPhuoc Tran-Gia

An Evaluation of QoE in Cloud Gaming Based on Subjective Tests 330

Michael Jarschel, Daniel Schlosser, Sven Scheuring, and Tobias Hofifeld

X

Page 8: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Functional Composition and Its ChallengesAbbas Siddiqui, Rahamatuttah Khondoker, BerndReuther, Paul Mueller,

Christian Henke, andHelge Backhaus

,336

Session 2: Security Issues and Mobile Internet Applications (FINGNet 2011)

Secure Code Dissemination Using Energy-Efficient Minimal Virtual

Backbone in Sensor Networks 341

Jisun Kim, Jiyoung Lim, and Kijoon Chae

Self-Similar Properties of Spam 347

JongsukR. Lee, Hae-Duck J. Jeong, Don McNickle, and Krz)>sztofPawlikowski

DAD-Less MIPv6 for Reduced Handover Latency 353

Yu-xuan Hong, KrzysztofPawlikowski, andHarsha Sirisena

CoLib: Client Library for Effective Development ofWebDAV-based

Collaborative Application 361

Hong-Chang Lee, Bo-Hyeon Kim, and Myung-Joon Lee

Session 1: Internet Security (IFSN 2011)

Gregex: GPU Based High Speed Regular Expression Matching Engine 366

Lei Wang, Shuhui Chen, Yong Tang, andJinshu Su

A Network Security Evaluation Method Framework Based on Multiple

Criteria Decision Making Theory 371

Zhao Jinjing, Wen Yan, and Wang Dongxia

A Framework of Network Security Situation Analysis Based on

the Technologies ofEvent Correlation and Situation Assessment 376

FengXuewei, Wang Dongxia, Ke Shanwen, Ma Guoqing, andLi Jin

Session 2: Wireless Networks (IFSN 2011)

Energy Optimal Selection ofAccess Points in Wireless Sensor Networks 381

Qin Xin, Xiaolan Yao, and Wei He

Building Practical Self Organization Networks on Heterogeneous Wireless

Modems 388

Zhu Tang, Bo Liu, Baokang Zhao, Wanrong Yu, Chunqing Wu, Wei Peng, Bin Bai,

and Yanpeng Ma

Session 3: System Security (IFSN 2011)

Snail Crawling: An Enhanced Method for DTNs Routing 394

BingBai, Jinshu Su, Baokang Zhao, Wanrong Yu, and Ling Wen

xi

Page 9: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Towards Practical IPSec over Challenged Networks 398

Jing Tao andBaosheng Wang

Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in

a Non-bypassable Way 403

Yan Wen, Jinjing Zhao, Minhuan Huang, andHua Chen

Session 1: Wireless Networks (ITAUC 2011)

Performance of Energy Efficient Relay and Minimum Distance Clustering

for Wireless Sensor Networks 408

Yung-Fa Huang, Hsing-Chung Chen, Li-Ming Wang, andJhao-Wei Guo

Impact of Broadcasting Directions in SDLS for Wireless Sensor Networks 414

Chia-Hsin Cheng, Hsirrying Liang, Yung-Fa Huang, andTian-Yue Wu

A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous

Networks 420

Hsing-Chung Chen and Kanoksak Wattanachote

TOA Estimation with DLC Receivers for IEEE 802.15.4a UWB Systems 424

Hsi-Chou Hsu, Jyh-Horng Wen, Chia-Hsin Cheng, Yi-Shiang Chen, and Tian-Yue Wu

Session 2: Intelligent Systems and Algorithms (ITAUC 2011)

A Generalized Associated Temporal and Spatial Role-Based Access Control

Model for Wireless Heterogeneous Networks 429

Hsing-Chung Chen, Yung-Fa Huang, and Syuan-Zong Lin

A Minimal Fuzzy Gain Scheduling Speed Controller and Torque

Compensation for the Variable Sampling System of BLDC Motors 434

Chung-Wen Hung, Jhih-Han Chen, andHsuan T. Chang

A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform 438

Kouhei Umezaki, Evjola Spaho, Yuichi Ogata, Hironori Ando, Leonard Barolli,

andFatos Xhafa

Session 1: Performance Modeling of Vehicular Mobility (MoMoPE 2011)

SaMob: A Social Attributes Based Mobility Model for Ad Hoc Networks 444

Jingxin Wang, Jian Yuan, Xiuming Shan, Zhenming Feng, Junwei Geng, andllsun You

NAVOPT: Navigator Assisted Vehicular Route OPTimizer 450

Wooseong Kim and Mario Gerla

A Secure and Location Assurance Protocol for Location-Aware Services

in VANETs 456

Youngho Park, Kyung-Hyune Rhee, and Chul Sur

xii

Page 10: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Session 2: Performance Modeling of Mobility Protocols (MoMoPE 2011)

Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility

Management 462

YujiaZhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan, and Ilsun You

Joint Uplink/Downlink Connection Admission Control in WLAN/Cellular

Integrated Systems 470

Hyung-Taig Lim, Younghyun Kim, Sangheon Pack, and Chul-Hee Kang

PMlPv6-based Flow Mobility Simulation in NS-3 475

Hyon-Young Choi, Sung-Gi Min, and Youn-Hee Han

Mobility Management Research of Internet Based on the Splitting Mechanism 481

Huachun Zhou, Fei Song, and Hongke Zhang

Session 3: Performance Modeling of Security Protocols (MoMoPE 2011)

Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated

Addresses 487

Sean Shen, Xiaodong Lee, Zhili Sun, and Sheng Jiang

Mobility Modeling and Security Validation of a Mobility Management

Scheme Based on ECC for IP-based Wireless Sensor Networks (6L0WPAN) 491

Antonio J. Jara, Leandro Marin, Antonio F.G. Skarmeta, Dhananjay Singh,

Gohel Bakul, and Daeyeoul Kim

Analysis of Multi-path Random Key Pre-distribution for Wireless Sensor

Networks 497

Chun-Wei Tsai, Wei-Shuo Li, Min Chen, Wen-Shyong Hsieh, and Chu-Sing Yang

Session 1: Steganography and Signature (MCNCS 2011)

E-mail-Based Covert Channels for Asynchronous Message Steganography 503

Aniello Castiglione, Alfredo de Santis, Ugo Fiore, andFrancesco Palmieri

Improvement of Strong Designated Verifier Signatures 509

Fuw-Yi Yang, Ling-Ren Liang, and Su-Hui Chiu

Identity-Based Concurrent Signature Scheme with Improved Accountability 514

Chih-Hung Wang and Chao Chuan Chen

Session 2: Network and System Security (MCNCS 2011)

SECR3T: Secure End-to-End Communication over 3G Telecommunication

Networks 520

Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Fabio Petagna

xiii

Page 11: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

Integrating Security Considerations in Client Server Architectures of Health

Information Systems Development 527

Chih-Cheng Lien, Chang-Wu Liu, and YI-An Chen

A Novel Stream Cipher with Hash Function for the RFID Device ..532

Sung-Shiou Shen, Horng-Ru Liao, Shen-Ho Lin, andJung-Hui Chiu

Use Double Check Priority Queue to Alleviate Malicious Packet Flows

from Distributed DoS Attacks 537

Chu-Hsing Lin, Jung-Chun Liu, Gucm-Han Chen, Ying-Hsuan Chen,

and Chien-Hua Huang

Session 3: System Security and Reliability (MCNCS 2011)

A Study on Digital Forensics Standard Operation Procedure for Wireless

Cybercrime 543

I-LongLin, Yun-Sheng Yen, andAnnie Chang

A TOA Based Location Estimation Incorporating the Reliability Information 549

Chin-Tseng Huang, Hwa-Lu Jhi, andRu-Chi Ni

Session 4: Cloud Computing and Security (MCNCS 2011)

An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV 555

Chin-Ling Chen, Yu-Fan Lin, andFang-Yie Leu

Constructing a Private Cloud for Government IT Services Consolidation:

Taiwan's Experence 561

Chi-Fu Hung, Chiu-Ching Tuan, and Yu-Chi Chu

The Use of Cloud Speech Recognition Technology in Vehicle Diagnosis

Applications 567

Shi-Huang Chen, Jun-Yu Chen, andKuo-Yuan Lu

Session 5: Wireless Network and Communication (MCNCS 2011)

A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous

Wireless Networks 571

Fang-Yie Leu andKuo-Chi Liang

A Semi-preemptive Ad Hoc Computational Service System with Limited

Resources 577

Fang-Yie Leu and Keng-Yen Chao

Maximizing Throughput for Delay-Constraint Transmissions with Smart

Antenna Systems in WLANs 583

Li-Ling Hung, Sheng-Han Wu, and Chao-Tsun Chang

xiv

Page 12: UbiquitousComputing (IMIS 2011)2011 Fifth International ConferenceonInnovative Mobileand Internet Services in UbiquitousComputing IMIS2011 TableofContents MessagefromIMIS2011 General

An AC LED Smart Lighting System with Visible Light Time-Division

Multiplexing Free Space Optical Communication 589

Fenq-Lin Jenq, Tang-Jen Liu, and Fang-Yie Leu

Session 1: Security Systems and Algorithms (WAIS 2011)

Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields

with Characteristic 3 594

Tetsuya Jzu, Masahiko Takenaka, and Masaya Yasuda

Identity Continuance in Single Sign-On with Authentication Server Failure 597

Kakizaki Yoshio, Maeda Kazunari, and Iwamura Keiichi

A Multiplicative Extension for Discrete Logarithms on Ordinary

Pairing-Friendly Curves of Embedding Degree 603

Yasuyuki Nogami, Erika Yanagi, Taichi Sumo, Tomoko Matsushima, and Satoshi Uehara

Design and Implementation of a Forced Encryption Kernel Module 607

Jun Furukawa, Akihira Sakai, TakashiNishi.de, Yoshiaki Hori, andKouichi Sakurai

Session 2: Information Security (WAIS 2011)

Identifier Migration in OpenID 612

Maeda Kazunari, Kakizaki Yoshio, andIwamura Keiichi

Pvho Method with Period k on Non-symmetric Ordinary Pairings

of Embedding Degree k - Especially for Barreto-Naehrig Curves 618

Yasuyuki Nogami, Yusuke Takai, Tomoko Matsushima, and Satoshi Uehara

Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic

Similarity 622

Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, and Kimihiko Sekino

Session 3: Secure Schemes and Frameworks (WAIS 2011)

32-bit as Number Based IP Traceback : 628

Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka, and Eiji Okamoto

Optimal Constructions ofVisual Secret Sharing Schemes for the Graph Access

Structure 634

Yuji Suga

Traceback Framework against Botmaster by Sharing Network Communication

Pattern Information 639

Seiichiro Mizoguchi, Keisuke Takemori, Yulaka Miyake, Yoshiaki Hori,

andKouichi Sakurai

Author Index .645


Recommended