Home // INTERNET
INTERNET 2012, The Fourth International Conference on Evolving Internet
Type: conference
Notes: IARIA Conference.
Editors:
Massimo Villari, University of Messina, Italy
Dirceu Cavendish, Kyushu Institute of Technology, Japan
Jean-François Couchot, FEMTO-ST, University of Franche-Comté, France
ISSN: 2308-443X
ISBN: 978-1-61208-204-2
Location: Venice, Italy
Dates: from June 24, 2012 to June 29, 2012
Articles: there are 18 articles
Considering Future Internet on the Basis of Smart Urban Cities A Client-City Architecture for Viable Smart Cities
Leonidas Anthopoulos and Panos Fitsilis
keywords: future Internet; smart city; internet challenges; knowledge city; networks of knowledge; smart city viability
The Economic Implications of Edge-Directed Routing: A Network Operator’s Perspective
Patrick Kwadwo Agyapong and Marvin Sirbu
keywords: edge-directed routing; future Internet architecture; economic incentives
On Tuning TCP for Superior Performance on High Speed Path Scenarios
Dirceu Cavendish, Kazumi Kumazoe, Hirofumi Ishizaki, Takeshi Ikenaga, Masato Tsuru, and Yuji Oie
keywords: High speed networks; TCP congestion avoidance; Packet retransmissions; Path capacity and buffering;
Network Resources Allocation in Content-Aware Networks for Multimedia Applications
Eugen Borcoci, Radu Dinel Miruta, and Serban Georgica Obreja
keywords: Content-Aware Networking; Network Aware Applications; Multi-domain; Inter-domain peering; Management; Resource allocation; Future Internet
The Super-Browser: A new Paradigm for Web Applications
Mark Wallis, Frans Henskens, and Michael Hannaford
keywords: web browser; cloud; personal data; architecture
An Optimization Technique on Pseudorandom Generators based on Chaotic Iterations
Jacques M.Bahi, Xiaole Fang, and Christophe Guyeux
keywords: Internet security; Pseudorandom Sequences; Statis- tical Tests; Discrete Chaotic Iterations; Topological Chaos.
Dynamic Access Control Using Virtual Multicore Firewalls
Alexey Lukashin and Vladimir Zaborovsky
keywords: security; dynamic access control; firewall; virtualization; netgraph
Prototyping TCP Options to Reveal Host Identity in IP Address Sharing Environments
Elie Abdo, Mohamed Boucadair, and Jaqueline Queiroz
keywords: address sharing, CGN, TCP Option, HOST_ID
Investigation of Inadequate Multiple Account Users in a Q&A Site by Considering Deviations of Answer Submission Order
Kenji Umemoto, Naoki Ishikawa, Yasuhiko Watanabe, Ryo Nishimura, and Yoshihiro Okada
keywords: multiple account, Q&A site, deviation, submission order, credibility
Electric Vehicle Charging Infrastructure – Security Considerations and Approaches
Steffen Fries and Rainer Falk
keywords: eMobility security; Smart Grid security; charging infrastructure; IEC 61851; IEC 15118
Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network
Jaemin Lee, Chaungoc Tu, and Souhwan Jung
keywords: MITM; Rogue AP; Smart Phone;
A Robust Data Hiding Process Contributing to the Development of a Semantic Web
Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, and Christophe Guyeux
keywords: Semantic Web; Information Hiding; Steganography; Robustness; Chaotic Iterations
Federation Between CLEVER Clouds Through SASL/Shibboleth Authentication
Francesco Tusa, Antonio Celesti, Massimo Villari, and Antonio Puliafito
keywords: Cloud Computing; CLEVER; Federation; Security; SASL; SSO Authentication; SAML; Shibboleth
Maximum Likelihood Decoding Algorithm for Some Goppa and BCH Codes: Application to the Matrix Encoding Method for Steganography
Thierry P. Berger and Mohamed Bouye Medeni
keywords: Steganography; Error-correcting Codes; Complete Decoding; Goppa Codes; Embedding Efficient
State-of-the-art in Chaotic Iterations-based Pseudorandom Numbers Generators Application in Information Hiding
Jacques M. Bahi, Xiaole Fang, and Christophe Guyeux
keywords: Internet Security; Pseudorandom Number Generators; Information Hiding; Discrete Chaotic Iterations.
Application of Steganography for Anonymity through the Internet
Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, and Christophe Guyeux
keywords: Anonymity; Privacy; Internet; Information hiding; Steganography; Security; Chaotic iterations
A Geometrically Resilient Digital Image Watermarking Scheme Based on SIFT and Extended Template Embedding
Po-Chyi Su and Yu-Chuan Chang
keywords: digital watermark; geometrical transformations; SIFT; StirMark.
Formalizing and Verifying Anonymity of Crowds-based Communication Protocols with IOA
Yoshinobu Kawabe
keywords: anonymity; formal verification; Crowds; theorem-proving