21.12.2013 Views

Ieee globecom 2012 technical program - IEEE GLOBECOM 2013

Ieee globecom 2012 technical program - IEEE GLOBECOM 2013

Ieee globecom 2012 technical program - IEEE GLOBECOM 2013

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Qinghua Shen, Weihua Zhuang (University of Waterloo, Canada)<br />

TicTac: From Transfer-Incapable Carpooling to Transfer-Allowed Carpooling<br />

Yunfei Hou, Xu Li, Chunming Qiao (State University of New York, Buffalo, USA)<br />

A Distributed Opportunistic Scheduling Protocol for Multi-Channel Wireless Ad Hoc Networks<br />

Hua Chen, John S. Baras (University of Maryland College Park, USA)<br />

Ubiquitous Robust Data Delivery for Integrated RSNs in IoT<br />

Ashraf E. Al-Fagih, Fadi M. Al-Turjman, Hossam S. Hassanein (Queen's University, Canada)<br />

Wednesday, 5 December <strong>2012</strong> ● 10:00 – 12:00<br />

Room: North Exhibit Hall Room C<br />

CISS04: Internet Security I<br />

Chair: Raheem Beyah (Georgia Institute of Technology, USA)<br />

Pecan: A Circuit-less P2P Design for Anonymity<br />

Gang Xu, Leonardo Aguilera, Yong Guan (Iowa State University, USA)<br />

Real-World Sybil Attacks in BitTorrent Mainline DHT<br />

Liang Wang, Jussi Kangasharju (University of Helsinki, Finland)<br />

Relay Recommendation System (RRS) and Selective Anonymity for Tor<br />

Chenglong Li (CNCERT/CC, China)<br />

Yibo Xue (Tsinghua University, China)<br />

Yingfei Dong (University of Hawaii, USA)<br />

Dongsheng Wang (Tsinghua University, China)<br />

IRONSIDES: DNS with No Single-Packet Denial of Service or Remote Code Execution Vulnerabilities<br />

Martin Carlisle, Barry Fagin (US Air Force Academy, USA)<br />

Towards Active Measurement for DNS Query Behavior of Botnets<br />

Xiaobo Ma, Jianfeng Li, Jing Tao (Xi'an Jiaotong University, China)<br />

Xiaohong Guan (Xi’an Jiaotong University / Tsinghua University, China)<br />

Rabit: A Reputation Architecture for BitTorrent<br />

Hani Ragab-Hassen, Olga Jones, Nikos Galanis (University of Kent, UK)<br />

Wednesday, 5 December <strong>2012</strong> ● 10:00 – 12:00<br />

Room: North Exhibit Hall Room D<br />

CISS10: Information Security and Cryptography<br />

Chair: Xiaodong Lin (University of Ontario Institute of Technology, Canada)<br />

Linear Cryptanalysis against Block Ciphered System under Noisy Ciphertexts<br />

Yahya Khiabani, Shuangqing Wei (Louisiana State University, USA)<br />

Jian Yuan, Jian Wang (Tsinghua University, China)<br />

Hash Function Mapping Design Utilizing Probability Distribution for Pre-image Resistance<br />

Jianhua Mo (Shanghai Jiao Tong University, China)<br />

Xiawen Xiao (Nanchang University, China)<br />

Meixia Tao (Shanghai Jiao Tong University, China)<br />

Nanrun Zhou (Nanchang University, China)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!