Banner Photo 1 Banner Photo 2 Banner Photo 3 Banner Photo 4

IEEE ICC 2012 Technical Symposia Program

DISCOVER the industry's most comprehensive conference program featuring more than 1,000 peer reviewed presentations on current research and development results in areas of wireless networking & communications, communications theory, signal processing, optical systems, next-generation networking, information systems security, cognitive radio and ad hoc sensor networking, multimedia applications and selected topics related to E-Health, powerline, satellite, space, Smart Grid and tactical communications.

CISS: Communication and Information System Security

Tuesday, June 12 from 10:45 to 12:30

CISS01: Algorithmic Design Tuesday, June 12 from 10:45 to 12:30
Communication and Information System Security

Secure Distributed Top-k Aggregation
Kristjan V Jonsson (Reykjavik University, Iceland); Karl Palmskog (Royal Institute of Technology, Sweden); Ymir Vigfusson (Cornell University, USA)
Two Matrices for Blakley's Secret Sharing Scheme
Xiali Hei (Temple University & Guangdong University of Businiss Studies, USA); Xiaojiang Du (Temple University, USA); Binheng Song (Tsinghua University, P.R. China)
(epsilon, delta)-Secure Node Packing of Large-Scale Wireless Networks
Jemin Lee (Massachusetts Institute of Technology, USA); Hyundong Shin (Kyung Hee University, Korea); Moe Win (Massachusetts Institute of Technology, USA)
Multimodal Biometric Person Recognition System Based on Fingerprint and Finger-Knuckle-Print Using Correlation Filter Classifier
Salim Chitroub (Electronics and Computer Science Faculty, USTHB, Algeria); Abdallah Meraoumia (Signal and Image Processing Laboratory, USTHB, Algeria); Ahmed Bouridane (Northumbria UNiversity at Newcastle, United Kingdom)
E-NOTE: An E-voting System That Ensures Voter Confidentiality and Voting Accuracy
Haijun Pan (New Jersey Institute of Technology, USA); Edwin Hou (New Jersey Institute of Technology, USA); Nirwan Ansari (NJIT, USA)

CISS02: Attack and Defense Tuesday, June 12 from 10:45 to 12:30
Communication and Information System Security

Towards Effective Defense against Pollution Attacks on Network Coding
Donghai Zhu (Xi'an Jiaotong University, P.R. China); Xinyu Yang (Xi'an Jiaotong University, P.R. China); Wei Yu (Towson University, USA)
Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies
Charles Fleming (University of California Los Angeles, USA); Peter Peterson (UCLA, USA); Erik Kline (University of California Los Angeles, USA); Peter Reiher (UCLA, USA)
A Cooperative Protocol for Jamming Eavesdroppers in Wireless Networks
Joao P. Vilela (University of Coimbra, Portugal); Joao Barros (University of Porto & Instituto de Telecomunicações, Portugal)
Packet Forwarding Misbehavior Detection in Next-Generation Networks
Vikram Desai (University of Massachusetts, Amherst, USA); Sriram Natarajan (University of Massachusetts, Amherst, USA); Tilman Wolf (University of Massachusetts, USA)
Efficient Jamming Attacks on MIMO Channels
Shabnam Sodagari (Virginia Tech, USA); T. Charles Clancy (Virginia Tech, USA)
Tuesday, June 12 from 14:00 to 15:45

CISS03: Authentication Tuesday, June 12 from 14:00 to 15:45
Communication and Information System Security

An Efficient Handover Authentication Scheme with Location Privacy Preserving for EAP-based Wireless Networks
Qi Jing (Xidian University, P.R. China); Yuqing Zhang (Graduate University of Chinese Academy of Sciences, P.R. China); Xuefeng Liu (Xidian University, P.R. China); Anmin Fu (Nanjing University of Science and Technology, P.R. China)
An Pre-authentication Protocol with Symmetric Keys for Secure Handover in Mobile WiMAX Networks
Thuy Nguyen (Nanyang Technological University, Singapore); Maode Ma (Nanyang Technological University, Singapore)
Lightweight Mutual RFID Authentication
Behzad Malek (University of Ottawa, Canada); Ali Miri (Ryerson University & University of Ottowa, Canada)
EM3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks
Sanaa Taha (University of Waterloo & Cairo University, Canada); Sandra Céspedes (University of Waterloo & Icesi University, Canada); Sherman Shen (University of Waterloo, Canada)
Efficient Authentication and Key Management for the Home Area Network
Hasen Nicanfar (The University of British Columbia, Canada); Paria Jokar (University of British Columbia, Canada); Victor CM Leung (The University of British Columbia, Canada)

CISS04: Channel Analysis Tuesday, June 12 from 14:00 to 15:45
Communication and Information System Security

Secrecy Capacity Over Correlated Log-normal Fading Channel
Md. Zahurul Sarkar (Queen's University Belfast, United Kingdom); Tharmalingam Ratnarajah (Queens University of Belfast, United Kingdom)
Physical-Layer Security over Correlated Erasure Channels
Willie K Harrison (Georgia Institute of Technology, USA); Joao Almeida (Faculdade de Engenharia da Universidade do Porto & Instituto de Telecomunicações, Portugal); Steven McLaughlin (Georgia Institute of Technology, USA); Joao Barros (University of Porto & Instituto de Telecomunicações, Portugal)
Outage Performance for Amplify-and-Forward Channels with an Unauthenticated Relay
Jing Huang (University of California, Irvine, USA); Amitav Mukherjee (University of California, Irvine, USA); Lee Swindlehurst (University of California at Irvine, USA)
Performance of Pilot Jamming on MIMO Channels with Imperfect Synchronization
Chowdhury Shahriar (Virginia Tech, USA); Shabnam Sodagari (Virginia Tech, USA); T. Charles Clancy (Virginia Tech, USA)
Multiuser Transmit Security Beamforming in Wireless Multiple Access Channels
Jinsong Wu (Bell Laboratories & Alcatel-Lucent, P.R. China); Jinhui Chen (Alcatel-Lucent Shanghai Bell, P.R. China)
Tuesday, June 12 from 16:15 to 18:00

CISS05: Infrastructure Security Tuesday, June 12 from 16:15 to 18:00
Communication and Information System Security

A Novel Architecture against False Data Injection Attacks in Smart Grid
Sulabh Bhattarai (5 Hillbrook CT & Towson University, USA); Linqiang Ge (Computer and Information Sciences, Towson University, USA); Wei Yu (Towson University, USA)
A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity
Zhen Mo (University of Florida, USA); Yian Zhou (University of Florida, USA); Shigang Chen (University of Florida, USA)
Verifiable Symmetric Searchable Encryption For Semi-honest-but-curious Cloud Servers
Qi Chai (University of Waterloo, Canada); Guang Gong (University of Waterloo, Canada)
Enforcing Scalable and Dynamic Hierarchical Access Control in Cloud Computing
Ran Yang (Tsinghua University, P.R. China); Chuang Lin (Tsinghua University, P.R. China); Yixin Jiang (University of Waterloo, Canada)
Indirect Reciprocity Game Modelling for Secure Wireless Networks
Liang Xiao (Xiamen University & WINLAB, Rutgers University, P.R. China); Wanyi Lin (University of Maryland, USA); Yan Chen (University of Maryland, College Park, USA); K. J. Ray Liu (University of Maryland, USA)
Wednesday, June 13 from 08:00 to 09:45

CISS06: Wireless Sensor Network Security Wednesday, June 13 from 08:00 to 09:45
Communication and Information System Security

Fast Jamming Detection in Sensor Networks
Kartik Siddhabathula (University of Texas at Arlington, USA); Qi Dong (University of Texas at Arlington, USA); Donggang Liu (University of Texas at Arlington, USA); Matthew Wright (University of Texas at Arlington, USA)
A Novel Traffic-Analysis Back Tracing Attack for Locating Source Nodes in Wireless Sensor Networks
Mohamed Mahmoud (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)
Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks
Di Tang (Michigan State University, USA); Tongtong Li (Michigan State University, USA); Jian Ren (Michigan State University, USA)
All Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack
Yu Seung Kim (Carnegie Mellon University, USA); Frank Mokaya (Carnegie Mellon University, USA); Eric Chen (Carnegie Mellon University, USA); Patrick Tague (Carnegie Mellon University, USA)
Stealthy pre-attacks against random key pre-distribution security
Panagiotis (Panos) Papadimitratos (KTH, Sweden); Jing Deng (University of North Carolina at Greensboro, USA)
Wednesday, June 13 from 14:00 to 15:45

CISS07: Malware and OS Security Wednesday, June 13 from 14:00 to 15:45
Communication and Information System Security

How an SMS-Based Malware Infection Will Get Throttled by the Wireless Link
Ilona Murynets (AT&T Security Research Center, USA); Roger Piqueras Jover (AT&T Security Research Center, USA)
A Hybrid Framework to Analyze Web and OS Malware
Vitor Afonso (University of Campinas, Brazil); Dario Fernandes Filho (University of Campinas, Brazil); André Grégio (Renato Archer IT Research Center & University of Campinas, Brazil); Paulo Lício de Geus (University of Campinas, Brazil); Mario Jino (University of Campinas, Brazil)
File-Process Dependency Network and Malware Detection
Weixuan Mao (Xi'an Jiaotong University, P.R. China); Zhongmin Cai (Xi'an Jiaotong University, P.R. China); Xiaohong Guan (Xi'an Jiaotong University & Tsinghua University, P.R. China); Qian Feng (Xi'an Jiaotong University, P.R. China)
Revealing and Analysing Modem Malware
Pavel Celeda (Masaryk University, Czech Republic); Radek Krejci (CESNET & Masaryk University, Czech Republic); Vojtech Krmicek (Masaryk University, Czech Republic)
Designing Information Flow Policies for Android's Operating System
Radoniaina Andriatsimandefitra (SUPELEC, France); Stephane Geller (SUPELEC, France); Valérie Viet Triem Tong (SUPELEC, France)
Wednesday, June 13 from 16:15 to 18:00

CISS08: Mobile Security Wednesday, June 13 from 16:15 to 18:00
Communication and Information System Security

A First Look on the Effects and Mitigation of VoIP SPIT Flooding in 4G Mobile Networks
Elias Bou-Harb (Concordia University, Canada); Mourad Debbabi (Concordia University, Montreal, Canada); Chadi Assi (Concordia University, Canada)
Trust-Enhanced Message Security Protocol for Mobile Ad Hoc Networks
Isaac Woungang (Ryerson University, Canada); Mohammad S. Obaidat (Monmouth University, USA); Sanjay Kumar Dhurandher (Netaji Subhas Institute of Technology, India); Han-Chieh Chao (National Ilan University, Taiwan); Chris Liu (University of I-Lan, Taiwan)
A localized authentication and billing scheme for proxy mobile IPv6 in VANETs
Lo-Yao Yeh (National Center for High-Performance Computing, Taiwan); Jee-Gong Chang (National Center for High-Performance Computing & National Applied Research Laboratories, Taiwan); Weicheng Huang (National Center for High-Performance Computing, Taiwan); Yi-Lang Tsai (National Center for High-Performance Computing & National Applied Research Laboratories, Taiwan)
Mitigating SMS Spam by Online Detection of Repetitive Near-Duplicate Messages
Baris Coskun (AT&T Security Research Center, USA); Paul Giura (AT&T Security Research Center, USA)
WiMAX Mobile Subscriber Verification Using Gabor-Based RF-DNA Fingerprints
Donald Reising (AF Institute of Technology, USA); Michael A Temple (Air Force Institute of Technology, USA)
Thursday, June 14 from 08:00 to 09:45

CISS09: CISS09: Multimedia Security Thursday, June 14 from 08:00 to 09:45
Communication and Information System Security

A New Image Encryption Algorithm Based on a Chaotic DNA Substitution Method
Abir Awad (Ryerson University, Canada); Ali Miri (Ryerson University & University of Ottowa, Canada)
Watermark Removal using Pseudorandom Desynchronization by Selective Pixel Elimination
Pradhumna L Shrestha (University of Nebraska-Lincoln, USA); Michael Hempel (University of Nebraska-Lincoln, USA); Tao Ma (University of Nebraska-Lincoln, USA); Dongming Peng (University Nebraska - Lincoln, USA); Hamid Sharif (University of Nebraska-Lincoln, USA)
A Quality-Preserving Hidden Information Removal Approach for Digital Images
Fahimeh Rezaei (University of Nebraska Lincoln, USA); Michael Hempel (University of Nebraska-Lincoln, USA); Pradhumna Lal Shrestha (University of Nebraska Lincoln, USA); Tao Ma (University of Nebraska-Lincoln, USA); Dongming Peng (University Nebraska - Lincoln, USA); Hamid Sharif (University of Nebraska-Lincoln, USA)
EDES - Efficient Dynamic Selective Encryption Framework to Secure Multimedia Traffic in Wireless Sensor Networks
Abderrezak Rachedi (University Paris-Est Marne-la-Vallée, France); Kaddar Lamia (University of Versailles Saint Quentin, France); Ahmed Mehaoua (University of Paris Descartes, France)
On the Extraction of Spread-Spectrum Hidden Data in Digital Media
Ming Li (State University of New York at Buffalo, USA); Michel Kulhandjian (State University of New York at Buffalo, USA); Dimitris A. Pados (State University of New York at Buffalo, USA); Stella N. Batalama (State University of New York at Buffalo, USA); Michael Medley (Air Force Research Laboratory, USA); John Matyjas (Air Force Research Laboratory/RIGF, USA)
Thursday, June 14 from 14:00 to 15:45

CISS10: Network Analysis Thursday, June 14 from 14:00 to 15:45
Communication and Information System Security

Classifying Service Flows in the Encrypted Skype Traffic
Maciej Korczyński (Grenoble Informatics Laboratory, France); Andrzej Duda (Grenoble Institute of Technology, France)
ITACA: Flexible, Scalable Network Analysis
John Hurley (Queens University of Belfast, United Kingdom); Antonio Munoz (Queen's University of Belfast, United Kingdom); Sakir Sezer (Queen's University Belfast, United Kingdom)
Multilevel Early Packet Filtering Technique based on Traffic Statistics and Splay Trees for Firewall Performance Improvement
Zouheir Trabelsi (UAE University, UAE); Safaa Zeidan (UAE University, UAE)
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection
Matteo Avalle (Politecnico di Torino, Italy); Fulvio Risso (Politecnico di Torino, Italy); Riccardo Sisto (Politecnico di Torino, Italy)
Controlling Applications by Managing Network Characteristics
Vahab Pournaghshband (University of California, Los Angeles, USA); Leonard Kleinrock (University of California, Los Angeles, USA); Peter Reiher (UCLA, USA); Alexander Afanasyev (University of California, Los Angeles & Internet Research Laboratory, Laboratory for Advanced Systems Research, USA)

CISS-P1: P2P Security -- Poster session Thursday, June 14 from 14:00 to 15:45
Communication and Information System Security

Applying Trust and Reputation Mechanisms to a Kademlia-Based Distributed Hash Table
Michael Kohnen (University of Duisburg-Essen, Germany)
Trust Management Framework for Social Networks
Ping Zhang (IUPUI, USA); Arjan Durresi (Indiana University Purdue University Indianapolis, USA)
DDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense
Majing Su (Harbin Institute of Technology, P.R. China); Hongli Zhang (HarBin Institute of Technology, P.R. China); Binxing Fang (Harbin Institute of Technology, P.R. China); Xiaojiang Du (Temple University, USA)
A Trust-based Strategy for Addressing Residual Attacks in the RELOAD Architecture
Oussema Dabbebi (INRIA Nancy - Grand Est, France); Remi Badonnel (LORIA, France); Olivier Festor (INRIA Nancy - Grand Est, France)
Utilizing Social Links for Location Privacy In Opportunistic Delay-Tolerant Networks
Sameh Rasmy Anwar Zakhary (University of Nottingham, United Kingdom); Milena Radenkovic (University of Nottingham, United Kingdom)
Thursday, June 14 from 16:15 to 18:00

CISS11: Privacy and Information Hiding Thursday, June 14 from 16:15 to 18:00
Communication and Information System Security

Source Anonymity in Fair Scheduling: A Case for the Proportional Method
Abhishek Mishra (Lehigh University, USA); Parv Venkitasubramaniam (Lehigh University, USA)
Secure and Efficient Source Location Privacy-Preserving Scheme for Wireless Sensor Networks
Mohamed Mahmoud (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)
Privacy-Preserving PKIs with Reduced Server Trust
Giovanni Di Crescenzo (Telcordia Technologies, USA); Tao Zhang (Telcordia Technologies, USA)
Least-significant-digit Steganography in Low Bitrate Speech
Jin Liu (School of Computer, Huazhong University of Science and Technology, Wuhan, P.R. China); Ke Zhou (Huazhong University of Science and Technology, P.R. China); Hui Tian (National Huaqiao University, P.R. China)
Evaluating Component Hiding Techniques in Circuit Topologies
Jeffrey Todd McDonald (University of South Alabama & School of Computer and Information Science, USA); Yong Kim (Air Force Institute of Technology, USA); Daniel Koranek (Air Force Research Laboratory, USA); James Parham (Air Force Research Laboratory, USA)

CISS-P2: Intrusion Detection -- Poster session Thursday, June 14 from 16:15 to 18:00
Communication and Information System Security

Combining Wavelet Analysis and CUSUM Algorithm for Network Anomaly Detection
Christian Callegari (University of Pisa, Italy); Stefano Giordano (University of Pisa, Italy); Michele Pagano (University of Pisa, Italy); Teresa Pepe (University of Pisa, Italy)
Detection of Cache Pollution Attacks Using Randomness Checks
Hyundo Park (Bell Labs, Alcatel-Lucent, USA); Indra Widjaja (Bell Labs, Alcatel-Lucent, USA); Heejo Lee (Korea University, Korea)
On using multiple classifier systems for Session Initiation Protocol (SIP) anomaly detection
Anil S Mehta (Advanced Energy Solutions Group Inc., USA); Neda Hantehzadeh (Southern Illinois University, USA); Vijay Gurbani (Bell Laboratories, Alcatel-Lucent, USA); Tin Ho (Bell Labs, Lucent Technologies, USA); Flavia Sancier (Southern Illinois University, USA)
Distributed PCA-based anomaly detection in telephone networks through legitimate-user profiling
Maurizio Dusi (NEC Laboratories Europe, Germany); Christian Vitale (NEC Laboratories Europe, Germany); Saverio Niccolini (NEC Europe Ltd., Germany); Christian Callegari (University of Pisa, Italy)
An Improved Hidden Markov Model for Anomaly Detection Using Frequent Common Patterns
Afroza Sultana (Concordia University, Canada); Abdelwahab Hamou-Lhadj (Concordia University, Canada)
Media Centre >> Twitter Facebook RSS LinkedIn
Patron Logos