Internet and Distributed Computing Systems

5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

Editors:

ISBN: 978-3-642-34882-2 (Print) 978-3-642-34883-9 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. IDCS: Ad-Hoc and Sensor Networks

    1. No Access

      Book Chapter

      Pages 1-14

      An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks

    2. No Access

      Book Chapter

      Pages 15-28

      Effective Ad Hoc Social Networking on OLSR MANET Using Similarity of Interest Approach

    3. No Access

      Book Chapter

      Pages 29-42

      Distributed Algorithms for the Creation of a New Distributed IDS in MANETs

    4. No Access

      Book Chapter

      Pages 43-56

      Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks

  3. IDCS: Internet and Web Technologies

    1. No Access

      Book Chapter

      Pages 57-70

      Optimizing Streaming Server Selection for CDN-Delivered Live Streaming

    2. No Access

      Book Chapter

      Pages 71-84

      A Novel Hybrid IP Traceback Scheme with Packet Counters

    3. No Access

      Book Chapter

      Pages 85-96

      A Secure Mix Network with an Efficient Validity Verification Mechanism

    4. No Access

      Book Chapter

      Pages 97-110

      DLPR: A Distributed Locality Preserving Dimension Reduction Algorithm

  4. IDCS: Network Operations and Management

    1. No Access

      Book Chapter

      Pages 111-119

      A Leader-Based Reliable Multicast MAC Protocol for MPEG-4 Traffic

    2. No Access

      Book Chapter

      Pages 120-133

      On Action Permutation and Progress for Partially Commutative Asynchronous Binary Sessions

    3. No Access

      Book Chapter

      Pages 134-145

      A NetFlow v9 Measurement System with Network Performance Function

    4. No Access

      Book Chapter

      Pages 146-159

      Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy

  5. IDCS: Information Infrastructure

    1. No Access

      Book Chapter

      Pages 160-173

      MashStudio: An On-the-fly Environment for Rapid Mashup Development

    2. No Access

      Book Chapter

      Pages 174-187

      BSU: A Biased Seed Unchoking Algorithm for P2P Systems

    3. No Access

      Book Chapter

      Pages 188-201

      Towards a Secure and Available Smart Grid Using Intrusion Tolerance

    4. No Access

      Book Chapter

      Pages 202-216

      A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP

    5. No Access

      Book Chapter

      Pages 217-226

      On the Checkpointing Strategy in Desktop Grids

  6. IDCS: Resilience, Fault Tolerance, and Availability

    1. No Access

      Book Chapter

      Pages 227-237

      A Continuous Reverse Skyline Query Processing Considering the Mobility of Query Objects

    2. No Access

      Book Chapter

      Pages 238-252

      Performance Analysis of Wireless Intrusion Detection Systems

    3. No Access

      Book Chapter

      Pages 253-263

      Designated Condition One-Time Signatures

previous Page of 2