21.12.2013 Views

Ieee globecom 2012 technical program - IEEE GLOBECOM 2013

Ieee globecom 2012 technical program - IEEE GLOBECOM 2013

Ieee globecom 2012 technical program - IEEE GLOBECOM 2013

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Yifeng Zhou, Jun Li, Louise Lamont (Communications Research Centre Canada, Canada)<br />

Indoor Positioning and Distance-aware Graph-based Semi-supervised Learning Method<br />

Vahid Pourahmadi, Shahrokh Valaee (University of Toronto, Canada)<br />

Wednesday, 5 December <strong>2012</strong> ● 13:30 – 15:30<br />

Room: North Exhibit Hall Room B<br />

AHSN14: Security Issues<br />

Chair: Rui L. Aguiar (University of Aveiro / Instituto de Telecomunicações, Portugal)<br />

On Sleep-wakeup Scheduling of Non-penetrable Barrier-coverage of Wireless Sensors<br />

Donghyun Kim, Jiwoong Kim (North Carolina Central University, USA)<br />

Deying Li (Renmin University of China, China)<br />

Sung-Sik Kwon, Alade Tokuta (North Carolina Central University, USA)<br />

Privacy- and Integrity-Preserving Range Query in Wireless Sensor Networks<br />

Yao-Tung Tsou (National Taiwan University, Taiwan)<br />

Chun-Shien Lu (Academia Sinica, Taiwan)<br />

Sy-Yen Kuo (National Taiwan University, Taiwan)<br />

Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network<br />

Xiaojing Liao (Georgia Institute of Technology, USA)<br />

Jianzhong Li (Harbin Institute of Technology, China)<br />

A New 'Direction' for Source Location Privacy in Wireless Sensor Networks<br />

Shehla Rana, Nitin Vaidya (University of Illinois, Urbana-Champaign, USA)<br />

VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs<br />

Kuan Zhang, Xiaohui Liang, Rongxing Lu, Sherman Shen (University of Waterloo, Canada)<br />

Hai Zhao (Northestern University, China)<br />

A New Method to Secure RA-OLSR using IBE<br />

Jalel Ben-Othman (University of Paris 13, France)<br />

Yesica Imelda Saavedra Benitez (University of Versailles, France)<br />

Wednesday, 5 December <strong>2012</strong> ● 13:30 – 15:30<br />

Room: North Exhibit Hall Room C<br />

CISS05: Internet Security II<br />

Chair: Peter Reiher (UCLA, USA)<br />

Classification of Malicious Network Streams using Honeynets<br />

Fahim Abbasi, Richard J. Harris, Giovanni Moretti (Massey University, New Zealand)<br />

Aun Haider (National Institute of Information and Communications Technology, Japan)<br />

Nafees Anwar (Massey University, New Zealand)<br />

Embedded Markov Process based Model for Performance Analysis of Intrusion Detection and Prevention<br />

Systems<br />

Khalid Alsubhi, Mohamed Faten Zhani, Raouf Boutaba (University of Waterloo, Canada)<br />

Backward Traffic Throttling to Mitigate Bandwidth Floods<br />

Yehoshua Gev, Moti Geva, Amir Herzberg (Bar-Ilan University, Israel)<br />

Managing the Adoption of Asymmetric Bidirectional Firewalls: Seeding and Mandating

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!