Description |
1 online resource |
Series |
Lecture notes in computer science, 0302-9743 ; 7646 |
|
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI |
|
Lecture notes in computer science ; 7646.
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
|
Contents |
An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks / Shapla Khanam, Habibullah Yusuf Saleem and Al-Sakib Khan Pathan -- Effective Ad Hoc Social Networking on OLSR MANET Using Similarity of Interest Approach / Teerapat Sanguankotchakorn, Shradha Shrestha and Nobuhiko Sugino -- Distributed Algorithms for the Creation of a New Distributed IDS in MANETs / Paulo M. Mafra, Joni da Silva Fraga and Altair Olivo Santin -- Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks / Lei Zhang, Qianhong Wu, Bo Qin and Josep Domingo-Ferrer -- Optimizing Streaming Server Selection for CDN-Delivered Live Streaming / Zhenyun Zhuang and Shun Kwok -- A Novel Hybrid IP Traceback Scheme with Packet Counters / Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji -- A Secure Mix Network with an Efficient Validity Verification Mechanism / Kun Peng and Yuexin Zhang -- DLPR: A Distributed Locality Preserving Dimension Reduction Algorithm / Mina Ghashami, Hoda Mashayekhi and Jafar Habibi -- A Leader-Based Reliable Multicast MAC Protocol for MPEG-4 Traffic / Muhammad Khalil Afzal, Byung-Seo Kim and Sung Won Kim -- On Action Permutation and Progress for Partially Commutative Asynchronous Binary Sessions / Zhenguo Yang, Farong Zhong, Jinfang Zhang and Tiantian Song -- A NetFlow v9 Measurement System with Network Performance Function / Guang Cheng and Hua Wu -- Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy / Xiaohui Li, Dawu Gu, Yanli Ren, Ning Ding and Kan Yuan -- MashStudio: An On-the-fly Environment for Rapid Mashup Development / Jianyu Yang, Jun Han, Xu Wang and Hailong Sun -- BSU: A Biased Seed Unchoking Algorithm for P2P Systems / Xianglin Wei, Guomin Zhang, Jianhua Fan and Ming Chen -- Towards a Secure and Available Smart Grid Using Intrusion Tolerance / Maryam Tanha and Fazirulhisyam Hashim -- A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP / Hongda Li, Yang Liu and Qihua Niu -- On the Checkpointing Strategy in Desktop Grids / Dongping Wang and Bin Gong -- A Continuous Reverse Skyline Query Processing Considering the Mobility of Query Objects / Jongtae Lim, Yonghun Park, Kyoungsoo Bok and Jaesoo Yoo -- Performance Analysis of Wireless Intrusion Detection Systems / Khalid Nasr, Anas Abou-El Kalam and Christian Fraboul -- Designated Condition One-Time Signatures / Wei Gao, Kefei Chen, Guilin Wang and Xueli Wang -- SQL Injection Detection via Program Tracing and Machine Learning / Yi Wang and Zhoujun Li -- Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall / Thawatchai Chomsiri, Xiangjian He and Priyadarsi Nanda |
Summary |
This book constitutes the refereed proceedings of the 5th International Conference on Internet and Distributed Computing Systems, IDCS 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 22 revised full papers of IDCS 2012 presented were carefully reviewed and selected from 80 submissions. The papers cover the following topics: ad-hoc and sensor networks; internet and Web technologies; network operations and management; information infrastructure; resilience; fault tolerance and availability |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Software engineering |
|
Data protection |
|
Computer software |
|
Information storage and retrieval systems |
|
Information Systems Applications (incl. Internet) |
|
Algorithm Analysis and Problem Complexity |
|
Systems and Data Security |
|
Information Storage and Retrieval |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
information systems |
|
internet |
|
algoritmen |
|
algorithms |
|
computeranalyse |
|
computer analysis |
|
informatieontsluiting |
|
information retrieval |
|
informatieopslag |
|
information storage |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and author index |
Subject |
Internet -- Congresses
|
|
Electronic data processing -- Distributed processing -- Congresses
|
|
Informatique.
|
|
Electronic data processing -- Distributed processing
|
|
Internet
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Xiang, Yang
|
ISBN |
9783642348839 |
|
3642348831 |
|
9783642348846 |
|
364234884X |
|
3642348823 |
|
9783642348822 |
|