NTMS'2007 is the first IFIP International Conference on New Technologies, Mobility and Security that was held from May 2 to May 4, 2007 in Paris, France. NTMS'2007 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event was combined with tutorial sessions and workshops. Tutorials preceded the main program, aiming at the dissemination of mature knowledge and technology advances in the field. One Workshop immediately followed the main conference, offering the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to selected topics. TOC:Ad Hoc and Sensor Networks Critical Transmission Range for Connectivity in Ad-Hoc Networks; Hossein Ajorloo, et al. ScatterFactory: An Architecture Centric Framework for Wireless Sensor Networks; Mohammad Al Saad, et al. Performance of Multi-Hop Relaying Systems over Weibull Fading Channels; Salama Ikki, et al. Performance Study of a MAC Algorithm to Reduce Energy and Delay in Wireless Sensor Networks; Ioannis Gragopoulos, et al. A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks; Taojun Wu, et al. Resource Management, QoS TMN Management Systems using a Grid based agnostic middleware; Pasquale Donadio, et al. Direct RF Conversion Transceivers as a Base for Designing Dynamic Spectrum Allocation Systems; Oleg Panfilov, et al. Scalable Communication for High Performance and Inexpensive Reliable Strict QoS; Ing-Wher Chen, et al. A User Interface for Resource Management in a Mobile Environment; Badr Benmammar, et al. Application of Reuse Partitioning Concept to the IEEE 806.16 System: Design and Analysis; Soumaya Hamouda, et al. Evaluation of the performance of the SLoPS: Available Bandwidth Estimation Technique in IEEE 802.11b Wireless Networks; Abadelaziz Amamra, et all. Quality of Service Provisioning Issue of Accessing IP Multimedia Subsystem via Wireless LANs; Asma Elmangosh, et al. Cross-Layer Design Three-color Marking with MLCN for Cross-layer TCP Congestion Control in Multi-hop Mobile Ad-hoc Networks; Yi-Jen Lu, et al. Joint cross-layer power control and FEC design for TCP Westwood+ in Hybrid Wireless-Wired Networks; Gennaro Boggia, et al. Joint Cross-layer and Dynamic Subcarrier Allocation Design for Multicast OFDM Networks; Hoda Najafi, et al. Mobility Management, Handover and Power Management Handover Optimization for vehicle NEMO Networks; Lin Hai, et al. Introducing L3 Network-based Mobility Management for Mobility-Unaware IP Hosts; Damjan Damic. WiMax-based Vertical handovers for Next Generation Networks; Nadine Adra, et al. A System-Level Analysis of Power Consumption & Optimizations in 3G Mobile Devices; Nicolas Sklavos, et al. Fault-Tolerance, Networks, Transport & Software Engineering Runtime software modification method used on COTS system for high-availability network service; Takashi Ikebe, et al. MRC Diversity Reception of OFDM with M-ary Modulation over Frequency-Selective Nakagami-m Fading Channels; Ahmed F. ALNahhal, et al. Performance and flexibility of open source routing software; Vincenzo Eramo, et al. Emerging Wireless Communication Technologies; Ghaïs El Zein, et al. Upgrade of a Composite-Star Optical Network; Stefano Secci, et al. An Adaptive Approach to Optimize Software Component Quality Predictive Models: Case of Stability; Danielle Azar, et al. Transport Information Collection Protocol with clustering of information sources; Mohamed Karim SBAI, et al. Security Virtual Authentication Ring for Securing Network Operations; Na Li, et al. Federated Dynamic Authentication and Authorization in Daidalos; Zhikui Chen. Secure and Fast Roaming in 802.11 WLANs; Hassnaa Moustafa, et al. Wormhole Detection Method based on Location in Wireless Ad-hoc Networks; Kyu-ho Lee, et al. An Effective Defense Against Spoofed IP Traffic; Hikmat Farhat. On the security of quantum networks: a proposal framework and its capacity; Quoc-Cuong Le, et al. An adaptive security Framework for ad hoc networks; Vincent Toubiana, et al. Localization with witnesses; Arun Saha, et al. SAACCESS: Secured Ad hoc ACCess framework; Hakima Chaouchi, et al . Hiding User Credentials during the TLS authentication phase; Mohamad Badra, et al. On the Security of a Recent Chaotic Cipher; Muhammad Asim, et al. Enhanced Smart-Card-Based Authentication Scheme Providing Forward-Secure Key Agreement; Mahdi Asadpour, et al. A Mathematical Framework for Risk Assessment; Marco Benini, et al. An Efficient Hybrid Chaotic Image Encryption Scheme; Muhammad Asim, et al. Intrusion Detection and Mobile Code Security A Stateful Real Time Intrusion Detection System; Sourour Meharouech, et al. A dynamic Policy based Security Architecture for Mobile Agents; Misbah Mubarak, et al. A Scheme for Intrusion Detection and Response in Ad Hoc Networks; Marianne Azer, et al. Web Services Query Answering in Distributed Description Logics; Faisal Alkhateeb, et al. WSRank: A New Algorithm for Ranking Web Services; Xiaodi Huang. Authenticated Web Services: A WS-Security Based Implementation; Emiliano De Cristofaro, et al. Mobile Agents, Middleware and Pervasive Computing An architectural model for a Mobile Agents System Interoperability; Linda Zeghache, et al. P2PNet: A Simulation Architecture for P2P Systems; Lechang Cheng. A Middleware for Managing Sensory Information in Pervasive Environments; Costas Pontikakos, et al. An Advanced Metering Infrastructure for Future Energy Networks; Stamatis Karnouskos. Internet Topology Based Identifier Assignment for Tree-based DHTs; Lechang Cheng, et al. Poster papers A Secure Dynamic Remote User Authentication without any Secure Channel; Ashutosh Saxena. Cross-Layer Optimization for Dynamic Rate Allocation in a Multi-User Video Streaming System; Charles Yaacoub, et al. Design and implementation of a Decentralized Access Control System (DACS) and an application; Tobias Hof, et al. Monitoring and Security of Container Transports; Jens Ove Lauf, et al. A new approach for anomalies resolution within filtering rules; Anis Yazidi, et al. "SPMCS": A Scalable Architecture for Peer-to-Peer Multiparty Conferencing; Amad Mourad, et al. An Efficient Authenticated Key Agreement Protocol; Pierre Abi char, et al. Growing Hierarchical Self-Organizing Map for Alarm Filtering in Netowrk Intrusion Detection Systems; Ahmad Faour Philippe Leray, et al. AGDH (Asymmetric Group Diffie Hellman) An Efficient and Dynamic Group Key Agreement Protocol for Ad hoc Networks; Raghav Bhaskar, et al.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.