Ieee globecom 2012 technical program - IEEE GLOBECOM 2013
Ieee globecom 2012 technical program - IEEE GLOBECOM 2013
Ieee globecom 2012 technical program - IEEE GLOBECOM 2013
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Qinghua Shen, Weihua Zhuang (University of Waterloo, Canada)<br />
TicTac: From Transfer-Incapable Carpooling to Transfer-Allowed Carpooling<br />
Yunfei Hou, Xu Li, Chunming Qiao (State University of New York, Buffalo, USA)<br />
A Distributed Opportunistic Scheduling Protocol for Multi-Channel Wireless Ad Hoc Networks<br />
Hua Chen, John S. Baras (University of Maryland College Park, USA)<br />
Ubiquitous Robust Data Delivery for Integrated RSNs in IoT<br />
Ashraf E. Al-Fagih, Fadi M. Al-Turjman, Hossam S. Hassanein (Queen's University, Canada)<br />
Wednesday, 5 December <strong>2012</strong> ● 10:00 – 12:00<br />
Room: North Exhibit Hall Room C<br />
CISS04: Internet Security I<br />
Chair: Raheem Beyah (Georgia Institute of Technology, USA)<br />
Pecan: A Circuit-less P2P Design for Anonymity<br />
Gang Xu, Leonardo Aguilera, Yong Guan (Iowa State University, USA)<br />
Real-World Sybil Attacks in BitTorrent Mainline DHT<br />
Liang Wang, Jussi Kangasharju (University of Helsinki, Finland)<br />
Relay Recommendation System (RRS) and Selective Anonymity for Tor<br />
Chenglong Li (CNCERT/CC, China)<br />
Yibo Xue (Tsinghua University, China)<br />
Yingfei Dong (University of Hawaii, USA)<br />
Dongsheng Wang (Tsinghua University, China)<br />
IRONSIDES: DNS with No Single-Packet Denial of Service or Remote Code Execution Vulnerabilities<br />
Martin Carlisle, Barry Fagin (US Air Force Academy, USA)<br />
Towards Active Measurement for DNS Query Behavior of Botnets<br />
Xiaobo Ma, Jianfeng Li, Jing Tao (Xi'an Jiaotong University, China)<br />
Xiaohong Guan (Xi’an Jiaotong University / Tsinghua University, China)<br />
Rabit: A Reputation Architecture for BitTorrent<br />
Hani Ragab-Hassen, Olga Jones, Nikos Galanis (University of Kent, UK)<br />
Wednesday, 5 December <strong>2012</strong> ● 10:00 – 12:00<br />
Room: North Exhibit Hall Room D<br />
CISS10: Information Security and Cryptography<br />
Chair: Xiaodong Lin (University of Ontario Institute of Technology, Canada)<br />
Linear Cryptanalysis against Block Ciphered System under Noisy Ciphertexts<br />
Yahya Khiabani, Shuangqing Wei (Louisiana State University, USA)<br />
Jian Yuan, Jian Wang (Tsinghua University, China)<br />
Hash Function Mapping Design Utilizing Probability Distribution for Pre-image Resistance<br />
Jianhua Mo (Shanghai Jiao Tong University, China)<br />
Xiawen Xiao (Nanchang University, China)<br />
Meixia Tao (Shanghai Jiao Tong University, China)<br />
Nanrun Zhou (Nanchang University, China)