SCNC 2011 logo
IEEE

The First International Workshop on Security in Computers, Networking and Communications

Committees

Friday, April 15

8:30 AM - 10:30 AM

S1: System Security

Chair: Xiaohui Liang (University of Waterloo, Canada)
Contextual Role-based Security Enhancement Mechanism for 2G-RFID Systems
Wan Tang (South-Central University for Nationalities, P.R. China); Jin Ni (Henan University, P.R. China); Min Chen (Seoul National University, Korea); XiMin Yang (South-Central University for Nationalities, P.R. China)
pp. 959-963
Browsing Behavior Mimicking Attacks on Popular Web Sites for Large Botnets
Shui Yu (Deakin University, Australia); Guofeng Zhao (Chonqing University of Posts and Telecommunications, P.R. China); Song Guo (University of Aizu, Japan); Yang Xiang (Deakin University, Australia); Athanasios Vasilakos (National Technical University of Athens, Greece)
pp. 964-968
Discriminating DDoS Attack Traffic from Flash Crowd through Packet Arrival Patterns
Theerasak Thapngam (Deakin University, Australia); Shui Yu (Deakin University, Australia); Wanlei Zhou (Deakin University, Australia); Gleb Beliakov (Deakin University, Australia)
pp. 969-974
EagleEye: A Logging Framework for Accountable Distributed and Networked Systems
Nandhakumar Kathiresshan (The University of Alabama, USA); Zhifeng Xiao (The University of Alabama, USA); Yang Xiao (The University of Alabama, USA)
pp. 975-980
Stepping Stone Detection at The Server Side
Ruei-Min Lin (Academia Sinica, Taiwan); Yi-Chun Chou (National Taiwan University, Taiwan); Kuan-Ta Chen (Academia Sinica, Taiwan)
pp. 981-986
PEACE: An Efficient and Secure Patient-centric Access Control Scheme for eHealth Care System
Mrinmoy Barua (University of Waterloo, Canada); Xiaohui Liang (University of Waterloo, Canada); Rongxing Lu (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)
pp. 987-992
L-WMxD: Lexical based Webmail XSS Discoverer
Zhushou Tang (Shanghai Jiao Tong University, P.R. China); Haojin Zhu (Shanghai Jiao Tong University, P.R. China); Zhenfu Cao (Shanghai Jiao Tong University, P.R. China); Shuai Zhao (Shanghai Jiao Tong University, P.R. China)
pp. 993-998
How Resilient are Individual ASes against AS-Level Link Failures?
Wenping Deng (National University of Defense Technology, P.R. China); Peidong Zhu (NUDT, P.R. China); Naixue Xiong (Georgia State University, US, USA); Yang Xiao (The University of Alabama, USA); Xiaofeng Hu (National University of Defense Technology, P.R. China)
pp. 999-1004

11:00 AM - 12:30 PM

S2: Security and Privacy

Chair: Xu Li (University of Waterloo, Canada)
Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity
Bidi Ying (University of Ottawa, Canada); Jose R. Gallardo (University of Ottawa, Canada); Dimitrios Makrakis (University of Ottawa, Canada); Hussein Mouftah (University of Ottawa, Canada)
pp. 1005-1010
A Three-Dimensional Approach Towards Measuring Sender Anonymity
Neeraj Jaggi (Wichita State University, USA); Umesh MarappaReddy (Wichita State University, USA); Rajiv Bagai (Wichita State University, USA)
pp. 1011-1016
Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks
Madhu J Sharma (University of British Columbia, Canada); Victor CM Leung (The University of British Columbia, Canada)
pp. 1017-1022
Lightweight Privacy-Preserving Routing and Incentive Protocol for Hybrid Ad Hoc Wireless Network
Mohamed Mahmoud (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)
pp. 1023-1028
SANC: Source Authentication Using Network Coding
Ahmed Fathy (Nile University, Egypt); Tamer ElBatt (Nile University, Egypt); Moustafa Youssef (Egypt-Japan University of Science and Technology (E-JUST), Egypt)
pp. 1029-1034
Towards a Light-weight Message Authentication Mechanism Tailored for Smart Grid Communications
Mostafa M. Fouda (Tohoku University, Japan); Zubair Md. Fadlullah (Tohoku University, Japan); Nei Kato (Tohoku University, Japan); Rongxing Lu (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)
pp. 1035-1040

2:00 PM - 3:30 PM

S3: Secure Algorithm

Chair: Sherman S. M. Chow (University of Waterloo, Canada)
A New Enforcement on Declassification with Reachability Analysis
Cong Sun (Peking University, P.R. China); Liyong Tang (Peking University, P.R. China); Zhong Chen (School of Electronics Engineering and Computer Science, Peking University, P.R. China)
pp. 1041-1046
Speeding up Pattern Matching by Optimal Partial String Extraction
Tan Jianlong (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Liu Xia (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Liu Yanbing (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Liu Ping (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China)
pp. 1047-1052
Traffic-aware Top-N Firewall Approximation Algorithm
Ho-Yu Lam (Polytechnic Institute of New York University, USA); Donghan Wang (Carnegie Mellon University, USA); H. Jonathan Chao (Polytechnic Institute of New York University, USA)
pp. 1053-1058
A Novel Data Streaming Method Detecting Superpoints
Weijiang Liu (Dalian Maritime University, P.R. China); Wenyu Qu (Dalian Maritime University, P.R. China); Gong Jian (Southeast University, P.R. China); Li Keqiu (Dalian University of Technology, P.R. China)
pp. 1059-1064
Exclusion-Intersection Encryption
Sherman S. M. Chow (University of Waterloo, Canada); Siu Ming Yiu (The University of Hong Kong, Hong Kong)
pp. 1065-1070
Identifying Bad Measurements in Compressive Sensing
Ht Kung (Harvard University, USA); Tsung-Han Lin (Harvard University, USA); Dario Vlah (Harvard University, USA)
pp. 1071-1076

4:00 PM - 5:30 PM

S4: Trustable Service

Chair: Haojin Zhu (Shanghai Jiao Tong University, P.R. China)
SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing
Weiwei Jia (Hohai University, P.R. China); Haojin Zhu (Shanghai Jiao Tong University, P.R. China); Zhenfu Cao (Shanghai Jiao Tong University, P.R. China); Lifei Wei (Shanghai Jiao Tong University, P.R. China); Xiaodong Lin (University of Ontario Institute of Technology, Canada)
pp. 1077-1082
Rendezvous Based Trust Propagation to Enhance Distributed Network Security
Ningning Cheng (University of California, Davis, USA); Kannan Govindan (University of California Davis, USA); Prasant Mohapatra (University of California, Davis, USA)
pp. 1083-1087
Enforce Truth-Telling in Wireless Relay Networks for Secure Communication
Shuhang Liu (Peking University, P.R. China); Rongqing Zhang (Peking University, P.R. China); Lingyang Song (Peking University, P.R. China); Zhu Han (University of Houston, USA); Bingli Jiao (Peking University, P.R. China)
pp. 1088-1092
Attacks on Correlated Peer-to-Peer Networks: An Analytical Study
Animesh Srivastava (Indian Institute of Technology Kharagpur, India); Bivas Mitra (CREA, CNRS/Ecole Polytechnique, France); Fernando Peruani (Max Planck Institute for the Physics of Complex Systems, Germany); Niloy Ganguly (Indian Institute of Technology Kharagpur, India)
pp. 1093-1098
Accountable MapReduce in Cloud Computing
Zhifeng Xiao (The University of Alabama, USA); Yang Xiao (The University of Alabama, USA)
pp. 1099-1104
RepHi: A Novel Attack against P2P Reputation Systems
Jingyu Feng (Xidian University, P.R. China); Yuqing Zhang (Graduate University of Chinese Academy of Sciences, P.R. China); Shenlong Chen (Graduate University of Chinese Academy of Sciences, P.R. China); Anmin Fu (Key Lab of Computer Networks and Information Security of Ministry of Education, P.R. China)
pp. 1105-1109