Limit search to available items
Book Cover
E-book
Author ICT-EurAsia (Conference) (2013 : Yogyakarta, Indonesia)

Title Information and communication technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You (eds.)
Published Berlin ; New York : Springer, [2013]
©2013
Online access available from:
Springer eBooks    View Resource Record  

Copies

Description 1 online resource (xvi, 552 pages) : illustrations (black and white)
Series Lecture notes in computer science, 0302-9743 ; 7804
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Lecture notes in computer science ; 7804
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Contents Information and Communication Technology- Eurasia Conference (ICT-EurAsia). E-Society. Translating the Idea of the eGovernment One-Stop-Shop in Indonesia / Fathul Wahid -- A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network / Thi Ai Thao Nguyen, Tran Khanh Dang -- Early-Detection System for Cross-Language (Translated) Plagiarism / Khabib Mustofa, Yosua Albert Sir -- TransWiki: Supporting Translation Teaching / Robert P. Biuk-Aghai, Hari Venkatesan -- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability -- Motivation -- Opportunity Framework / Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra -- Software Engineering. Software Development Methods in the Internet of Things / Selo Sulistyo -- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications / Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki -- OSMF: A Framework for OSS Process Measurement / Wikan Danar Sunindyo, Fajar Juang Ekaputra -- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs / Susmit Bagchi -- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning / Suprapto, Retantyo Wardoyo
Security and Privacy. On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries / Chan Nam Ngo, Tran Khanh Dang -- Semantic-Aware Obfuscation for Location Privacy at Database Level / Thu Thi Bao Le, Tran Khanh Dang -- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch / Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang -- CAPTCHA Suitable for Smartphones / Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura -- Code Based KPD Scheme with Full Connectivity: Deterministic Merging / Pinaki Sarkar, Aritra Dhar -- Cloud and Internet Computing. Indonesian Digital Natives / Neila Ramdhani, Wisnu Wiradhany -- End-to-End Delay Performance for VoIP on LTE System in Access Network / Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan -- Mobile Collaboration Technology in Engineering Asset Maintenance -- What Technology, Organisation and People Approaches Are Required? / Faisal Syafar, Jing Gao
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud / Nguyen Quang-Hung [and others] -- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution / Nungki Selviandro, Zainal Arifin Hasibuan -- Knowledge Management. Information Systems Strategic Planning for a Naval Hospital / Hery Harjono Muljo, Bens Pardamean -- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique / Wayan Suparta, Kemal Maulana Alhasa -- A Data-Driven Approach toward Building Dynamic Ontology / Dhomas Hatta Fudholi [and others] -- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement / Muhammad Asfand-e-yar, A Min Tjoa -- Asian Conference on Availability, Reliability and Security (AsiaARES). Dependable Systems and Applications. Secure and Verifiable Outsourcing of Sequence Comparisons / Yansheng Feng [and others] -- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter / Dongjin Choi, Ilsun You, Pankoo Kim
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) / Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki -- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation / Huabiao Lu [and others] -- On Identifying Proper Security Mechanisms / Jakub Breier, Ladislav Hudec -- A Recovery Approach for SQLite History Recorders from YAFFS2 / Beibei Wu [and others] -- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors / Yuchao She, Hui Li, Hui Zhu -- SA4WSs: A Security Architecture for Web Services / Lingxia Liu [and others] -- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation / Shuhui Hou [and others] -- A Test Case Generation Technique for VMM Fuzzing / Xiaoxia Sun [and others] -- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet / Thach V. Bui [and others] -- A Proposal on Security Case Based on Common Criteria / Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors / Wentao Jia, Rui Li, Chunyan Zhang -- Identity Management Lifecycle -- Exemplifying the Need for Holistic Identity Assurance Frameworks / Jostein Jensen -- Cryptography. Anonymous Lattice-Based Broadcast Encryption / Adela Georgescu -- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance / Amril Syalim, Takashi Nishide, Kouichi Sakurai -- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation / Xingxing Xie [and others] -- Provably Secure and Subliminal-Free Variant of Schnorr Signature / Yinghui Zhang [and others] -- A Block Cipher Mode of Operation with Two Keys / Yi-Li Huang [and others] -- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing / Ruxandra F. Olimid -- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme / Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong -- Privacy and Trust Management. A Simplified Privacy Preserving Message Delivery Protocol in VDTNs / Youngho Park, Chul Sur, Kyung-Hyune Rhee
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data / Anis Bkakria [and others] -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control / Nisreen Alam Aldeen, Gerald Quirchmayr -- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol / Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani -- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution / Bo Liu [and others] -- Network Analysis and Security. CSP-Based General Detection Model of Network Covert Storage Channels / Hui Zhu [and others] -- Trustworthy Opportunistic Access to the Internet of Services / Alessandro Armando [and others] -- Architecture of Network Environment for High-Risk Security Experimentation / Xiaohui Kuang, Xiang Li, Jinjing Zhao -- Emulation on the Internet Prefix Hijacking Attack Impaction / Jinjing Zhao, Yan Wen
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction / Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim -- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge / Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs / Huaqing Wen, Kyung-Hyune Rhee -- A Review of Security Attacks on the GSM Standard / Giuseppe Cattaneo [and others] -- Multimedia Security. An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation / Huan Wang, Mingxing He, Xiao Li -- Image Watermarking Using Psychovisual Threshold over the Edge / Nur Azman Abu [and others] -- A Data Structure for Efficient Biometric Identification / Kensuke Baba, Serina Egawa -- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System / Hae-Min Moon, Sung Bum Pan -- Shifting Primes on OpenRISC Processors with Hardware Multiplier / Leandro Marin, Antonio J. Jara, Antonio Skarmeta
Summary This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information storage and retrieval systems
Computers and Society
Systems and Data Security
Information Systems Applications (incl. Internet)
Notes International conference proceedings
Includes author index
Bibliography With bibliogr. references
Notes Print version record
Subject Computer networks -- Congresses.
Computer networks -- Security measures -- Congresses.
Software engineering -- Congresses.
Computer Communication Networks.
Computer Security.
Software.
Genre/Form Congress.
Conference papers and proceedings.
Conference papers and proceedings.
Form Electronic book
Author Mustofa, Khabib, editor
Neuhold, Erich J., editor
Tjoa, A Min, editor
Weippl, Edgar R., editor
You, Ilsun, editor
ISBN 9783642368189 (electronic bk.)
3642368182 (electronic bk.)
3642368174 (print)
9783642368172 (print)
Other Titles ICT-EurAsia 2013