Computational Intelligence and Security: International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005.

The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Author(s): Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim (auth.), Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao (eds.)
Series: Lecture Notes in Computer Science 3802 : Lecture Notes in Artificial Intelligence
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 1166
Tags: Artificial Intelligence (incl. Robotics); Information Storage and Retrieval; Information Systems Applications (incl.Internet); Computation by Abstract Devices; Algorithm Analysis and Problem Complexity; Management of Computing and Inform

Front Matter....Pages -
A Fast Inversion Algorithm and Low-Complexity Architecture over GF (2 m )....Pages 1-8
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings....Pages 9-16
FMS Attack-Resistant WEP Implementation Is Still Broken....Pages 17-26
Design of a New Kind of Encryption Kernel Based on RSA Algorithm....Pages 27-32
On the Security of Condorcet Electronic Voting Scheme....Pages 33-42
Special Distribution of the Shortest Linear Recurring Sequences in Z /( p ) Field....Pages 43-48
Cryptanalysis of a Cellular Automata Cryptosystem....Pages 49-54
A New Conceptual Framework Within Information Privacy: Meta Privacy....Pages 55-61
Error Oracle Attacks on Several Modes of Operation....Pages 62-67
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences....Pages 68-73
On the Construction of Some Optimal Polynomial Codes....Pages 74-79
Perceptual Hashing of Video Content Based on Differential Block Similarity....Pages 80-85
Secure Software Smartcard Resilient to Capture....Pages 86-95
Revised Fischlin’s (Blind) Signature Schemes....Pages 96-103
Certificateless Threshold Signature Schemes....Pages 104-109
An Efficient Certificateless Signature Scheme....Pages 110-116
ID-Based Restrictive Partially Blind Signatures....Pages 117-124
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing....Pages 125-130
On Anonymity of Group Signatures....Pages 131-136
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols....Pages 137-142
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks....Pages 143-148
On the Security of Some Password-Based Key Agreement Schemes....Pages 149-154
A New Group Rekeying Method in Secure Multicast....Pages 155-160
Pairing-Based Provable Blind Signature Scheme Without Random Oracles....Pages 161-166
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings....Pages 167-172
An Identity-Based Threshold Signcryption Scheme with Semantic Security....Pages 173-179
A Token-Based Single Sign-On Protocol....Pages 180-185
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing....Pages 186-191
Efficient Compilers for Authenticated Group Key Exchange....Pages 192-197
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys....Pages 198-203
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks....Pages 204-211
A New User-Habit Based Approach for Early Warning of Worms....Pages 212-219
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM....Pages 220-227
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems....Pages 228-235
Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems....Pages 236-243
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection....Pages 244-251
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics....Pages 252-259
SoIDPS : Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation....Pages 260-266
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services....Pages 267-272
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain....Pages 273-278
Measuring the Histogram Feature Vector for Anomaly Network Traffic....Pages 279-284
Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme....Pages 285-290
Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model....Pages 291-296
Reducing Worm Detection Time and False Alarm in Virus Throttling....Pages 297-302
Protection Against Format String Attacks by Binary Rewriting....Pages 303-308
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function....Pages 309-314
Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information....Pages 315-321
Parallel Optimization Technology for Backbone Network Intrusion Detection System....Pages 322-327
Attack Scenario Construction Based on Rule and Fuzzy Clustering....Pages 328-333
A CBR Engine Adapting to IDS....Pages 334-339
Application of Fuzzy Logic for Distributed Intrusion Detection....Pages 340-347
Dynamic Access Control for Pervasive Grid Applications....Pages 348-355
On the Security of the Canetti-Krawczyk Model....Pages 356-363
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks....Pages 364-374
A Variant of Poly1305 MAC and Its Security Proof....Pages 375-380
Covert Channel Identification Founded on Information Flow Analysis....Pages 381-387
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems....Pages 388-397
Design and Implementation of a Parallel Crypto Server....Pages 398-406
Survivability Computation of Networked Information Systems....Pages 407-414
Assessment of Windows System Security Using Vulnerability Relationship Graph....Pages 415-420
A New ( t , n )-Threshold Multi-secret Sharing Scheme....Pages 421-426
An Efficient Message Broadcast Authentication Scheme for Sensor Networks....Pages 427-432
Digital Image Authentication Based on Error-Correction Codes....Pages 433-438
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e....Pages 439-444
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme....Pages 445-450
Building Security Requirements Using State Transition Diagram at Security Threat Location....Pages 451-456
Study on Security iSCSI Based on SSH....Pages 457-462
A Scheduling Algorithm Based on a Trust Mechanism in Grid....Pages 463-468
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device....Pages 469-475
Worm Propagation Modeling and Analysis on Network....Pages 476-481
An Extensible AAA Infrastructure for IPv6....Pages 482-487
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i....Pages 488-493
A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks....Pages 494-499
A Virtual Bridge Certificate Authority Model....Pages 500-507
Weak Signals in Information Security Management....Pages 508-517
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems....Pages 518-525
Methodology of Quantitative Risk Assessment for Information System Security....Pages 526-531
A Secure and Efficient ( t , n ) Threshold Verifiable Multi-secret Sharing Scheme....Pages 532-537
Improvement on an Optimized Protocol for Mobile Network Authentication and Security....Pages 538-541
Neural Network Based Flow Forecast and Diagnosis....Pages 542-547
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach....Pages 548-553
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function....Pages 554-559
Topology-Based Macroscopical Response and Control Technology for Network Security Event....Pages 560-566
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords....Pages 567-572
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients....Pages 573-580
An Image Steganography Using Pixel Characteristics....Pages 581-588
Alternatives for Multimedia Messaging System Steganography....Pages 589-596
Error Concealment for Video Transmission Based on Watermarking....Pages 597-604
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images....Pages 605-610
An Image Hiding Algorithm Based on Bit Plane....Pages 611-616
A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack....Pages 617-622
Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video....Pages 623-628
Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning....Pages 629-634
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems....Pages 635-642
An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis....Pages 643-648
A Digital Watermarking Technique Based on Wavelet Packages....Pages 649-654
A Spectral Images Digital Watermarking Algorithm....Pages 655-660
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks....Pages 661-668
The Study of RED Algorithm Used Multicast Router Based Buffer Management....Pages 669-678
Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection....Pages 679-686
MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management....Pages 687-694
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm....Pages 695-702
On a Novel Methodology for Estimating Available Bandwidth Along Network Paths....Pages 703-710
A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows....Pages 711-718
Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment....Pages 719-724
An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema....Pages 725-730
A Fuzzy Integral Method to Merge Search Engine Results on Web....Pages 731-736
The Next Generation PARLAY X with QoS/QoE....Pages 737-742
A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network....Pages 743-748
Introduction of Knowledge Management System for Technical Support in Construction Industries....Pages 749-756
An Event Correlation Approach Based on the Combination of IHU and Codebook....Pages 757-763
Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform....Pages 764-771
A Dynamic Face and Fingerprint Fusion System for Identity Authentication....Pages 772-779
Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique....Pages 780-787
Binarized Revocable Biometrics in Face Recognition....Pages 788-795
Short Critical Area Computational Method Using Mathematical Morphology....Pages 796-803
A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization....Pages 804-811
MFCC and SVM Based Recognition of Chinese Vowels....Pages 812-819
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain....Pages 820-825
Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing....Pages 826-831
Component-Based Online Learning for Face Detection and Verification....Pages 832-837
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression....Pages 838-844
Modified EZW Coding for Stereo Residual....Pages 845-850
Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks....Pages 851-856
Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264....Pages 857-862
Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation....Pages 863-868
Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries....Pages 869-874
Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow....Pages 875-880
Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization....Pages 881-886
Image Classification and Delineation of Fragments....Pages 887-892
A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization....Pages 893-898
A General Image Based Nematode Identification System Design....Pages 899-904
A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems....Pages 905-910
New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain....Pages 911-916
Line Segments and Dominate Points Detection Based on Hough Transform....Pages 917-922
The Study of the Auto Color Image Segmentation....Pages 923-928
Regularized Image Restoration by Means of Fusion for Digital Auto Focusing....Pages 929-934
Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection....Pages 935-940
Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation....Pages 941-946
SUSAN Window Based Cost Calculation for Fast Stereo Matching....Pages 947-952
An Efficient Adaptive De-blocking Algorithm....Pages 953-958
Facial Features Location by Analytic Boosted Cascade Detector....Pages 959-964
New Approach for Segmentation and Pattern Recognition of Jacquard Images....Pages 965-970
Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint....Pages 971-976
Principle of Image Encrypting Algorithm Based on Magic Cube Transformation....Pages 977-982
A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering....Pages 983-988
Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy....Pages 989-994
Incremental Fuzzy Decision Tree-Based Network Forensic System....Pages 995-1002
Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay....Pages 1003-1010
Using Concept Taxonomies for Effective Tree Induction....Pages 1011-1016
A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities....Pages 1017-1024
Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering....Pages 1025-1029
A Private and Efficient Mobile Payment Protocol....Pages 1030-1035
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce....Pages 1036-1041
An Efficient Control Method for Elevator Group Control System....Pages 1042-1047
Next Generation Military Communication Systems Architecture....Pages 1048-1053
Early Warning for Network Worms....Pages 1054-1059
Skeleton Representation of Character Based on Multiscale Approach....Pages 1060-1067
Channel Equalization Based on Two Weights Neural Network....Pages 1068-1073
Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set....Pages 1074-1079
Ring-Based Anonymous Fingerprinting Scheme....Pages 1080-1085
Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code....Pages 1086-1091
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem....Pages 1092-1097
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset....Pages 1098-1103
Design and Implementation of Crypto Co-processor and Its Application to Security Systems....Pages 1104-1109
Continuous Speech Research Based on HyperSausage Neuron....Pages 1110-1115
Variable-Rate Channel Coding for Space-Time Coded MIMO System....Pages 1116-1121
A New Watermarking Method Based on DWT....Pages 1122-1126
Efficient Point Rendering Method Using Sequential Level-of-Detail....Pages 1127-1133
Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets....Pages 1134-1139
Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus....Pages 1140-1148
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel....Pages 1149-1156
Back Matter....Pages -