Description |
1 online resource (xvi, 552 pages) : illustrations (black and white) |
Series |
Lecture notes in computer science, 0302-9743 ; 7804 |
|
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI |
|
Lecture notes in computer science ; 7804.
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
|
Contents |
Information and Communication Technology- Eurasia Conference (ICT-EurAsia). E-Society. Translating the Idea of the eGovernment One-Stop-Shop in Indonesia / Fathul Wahid -- A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network / Thi Ai Thao Nguyen, Tran Khanh Dang -- Early-Detection System for Cross-Language (Translated) Plagiarism / Khabib Mustofa, Yosua Albert Sir -- TransWiki: Supporting Translation Teaching / Robert P. Biuk-Aghai, Hari Venkatesan -- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability -- Motivation -- Opportunity Framework / Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra -- Software Engineering. Software Development Methods in the Internet of Things / Selo Sulistyo -- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications / Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki -- OSMF: A Framework for OSS Process Measurement / Wikan Danar Sunindyo, Fajar Juang Ekaputra -- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs / Susmit Bagchi -- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning / Suprapto, Retantyo Wardoyo |
|
Security and Privacy. On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries / Chan Nam Ngo, Tran Khanh Dang -- Semantic-Aware Obfuscation for Location Privacy at Database Level / Thu Thi Bao Le, Tran Khanh Dang -- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch / Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang -- CAPTCHA Suitable for Smartphones / Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura -- Code Based KPD Scheme with Full Connectivity: Deterministic Merging / Pinaki Sarkar, Aritra Dhar -- Cloud and Internet Computing. Indonesian Digital Natives / Neila Ramdhani, Wisnu Wiradhany -- End-to-End Delay Performance for VoIP on LTE System in Access Network / Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan -- Mobile Collaboration Technology in Engineering Asset Maintenance -- What Technology, Organisation and People Approaches Are Required? / Faisal Syafar, Jing Gao |
|
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud / Nguyen Quang-Hung [and others] -- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution / Nungki Selviandro, Zainal Arifin Hasibuan -- Knowledge Management. Information Systems Strategic Planning for a Naval Hospital / Hery Harjono Muljo, Bens Pardamean -- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique / Wayan Suparta, Kemal Maulana Alhasa -- A Data-Driven Approach toward Building Dynamic Ontology / Dhomas Hatta Fudholi [and others] -- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement / Muhammad Asfand-e-yar, A Min Tjoa -- Asian Conference on Availability, Reliability and Security (AsiaARES). Dependable Systems and Applications. Secure and Verifiable Outsourcing of Sequence Comparisons / Yansheng Feng [and others] -- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter / Dongjin Choi, Ilsun You, Pankoo Kim |
|
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) / Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki -- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation / Huabiao Lu [and others] -- On Identifying Proper Security Mechanisms / Jakub Breier, Ladislav Hudec -- A Recovery Approach for SQLite History Recorders from YAFFS2 / Beibei Wu [and others] -- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors / Yuchao She, Hui Li, Hui Zhu -- SA4WSs: A Security Architecture for Web Services / Lingxia Liu [and others] -- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation / Shuhui Hou [and others] -- A Test Case Generation Technique for VMM Fuzzing / Xiaoxia Sun [and others] -- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet / Thach V. Bui [and others] -- A Proposal on Security Case Based on Common Criteria / Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka |
|
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors / Wentao Jia, Rui Li, Chunyan Zhang -- Identity Management Lifecycle -- Exemplifying the Need for Holistic Identity Assurance Frameworks / Jostein Jensen -- Cryptography. Anonymous Lattice-Based Broadcast Encryption / Adela Georgescu -- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance / Amril Syalim, Takashi Nishide, Kouichi Sakurai -- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation / Xingxing Xie [and others] -- Provably Secure and Subliminal-Free Variant of Schnorr Signature / Yinghui Zhang [and others] -- A Block Cipher Mode of Operation with Two Keys / Yi-Li Huang [and others] -- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing / Ruxandra F. Olimid -- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme / Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong -- Privacy and Trust Management. A Simplified Privacy Preserving Message Delivery Protocol in VDTNs / Youngho Park, Chul Sur, Kyung-Hyune Rhee |
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data / Anis Bkakria [and others] -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control / Nisreen Alam Aldeen, Gerald Quirchmayr -- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol / Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani -- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution / Bo Liu [and others] -- Network Analysis and Security. CSP-Based General Detection Model of Network Covert Storage Channels / Hui Zhu [and others] -- Trustworthy Opportunistic Access to the Internet of Services / Alessandro Armando [and others] -- Architecture of Network Environment for High-Risk Security Experimentation / Xiaohui Kuang, Xiang Li, Jinjing Zhao -- Emulation on the Internet Prefix Hijacking Attack Impaction / Jinjing Zhao, Yan Wen |
|
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction / Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim -- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge / Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs / Huaqing Wen, Kyung-Hyune Rhee -- A Review of Security Attacks on the GSM Standard / Giuseppe Cattaneo [and others] -- Multimedia Security. An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation / Huan Wang, Mingxing He, Xiao Li -- Image Watermarking Using Psychovisual Threshold over the Edge / Nur Azman Abu [and others] -- A Data Structure for Efficient Biometric Identification / Kensuke Baba, Serina Egawa -- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System / Hae-Min Moon, Sung Bum Pan -- Shifting Primes on OpenRISC Processors with Hardware Multiplier / Leandro Marin, Antonio J. Jara, Antonio Skarmeta |
Summary |
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Information storage and retrieval systems |
|
Computers and Society |
|
Systems and Data Security |
|
Information Systems Applications (incl. Internet) |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
information systems |
|
internet |
|
informatieontsluiting |
|
information retrieval |
|
informatieopslag |
|
information storage |
|
computers |
|
samenleving |
|
society |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Notes |
International conference proceedings |
|
Includes author index |
Bibliography |
With bibliogr. references |
Notes |
English |
|
Print version record |
In |
Springer eBooks |
Subject |
Computer networks -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Software engineering -- Congresses
|
|
Computer security.
|
|
Computer networks.
|
|
Computer Security
|
|
Software
|
|
Computer Communication Networks
|
|
software.
|
|
Computer security
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Software engineering
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Mustofa, Khabib, editor
|
|
Neuhold, Erich J., editor
|
|
Tjoa, A. Min, editor
|
|
Weippl, Edgar R., editor
|
|
You, Ilsun, editor
|
ISBN |
9783642368189 |
|
3642368182 |
|
3642368174 |
|
9783642368172 |
|