Select Language  
Book's Detail
Information and communication technology: international conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013 : proceedings

This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.

Statement of Responsibility
Author(s) ICT-EurAsia (Conference) (2013 : Yogyakarta, Indonesia) - Conference
Mustofa, Khabib - Personal Name
Neuhold, Erich J. - Personal Name
Tjoa, A Min - Personal Name
Weippl, Edgar R. - Personal Name
You, Ilsun - Personal Name
Edition
Call Number [PRO-TIF-007]
Subject(s) Congresses
Computer networks
Software engineering
Language English
Publisher Springer-Verlag Berlin Heidelberg
Publishing Year 2013
Specific Detail Info Table of contents : Front Matter....Pages - Translating the Idea of the eGovernment One-Stop-Shop in Indonesia....Pages 1-10 A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network....Pages 11-20 Early-Detection System for Cross-Language (Translated) Plagiarism....Pages 21-30 TransWiki: Supporting Translation Teaching....Pages 31-40 Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework....Pages 41-49 Software Development Methods in the Internet of Things....Pages 50-59 SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications....Pages 60-70 OSMF: A Framework for OSS Process Measurement....Pages 71-80 Analyzing Stability of Algorithmic Systems Using Algebraic Constructs....Pages 81-90 Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning....Pages 91-100 On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries....Pages 101-110 Semantic-Aware Obfuscation for Location Privacy at Database Level....Pages 111-120 Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch....Pages 121-130 CAPTCHA Suitable for Smartphones....Pages 131-140 Code Based KPD Scheme with Full Connectivity: Deterministic Merging....Pages 141-151 Indonesian Digital Natives....Pages 152-161 End-to-End Delay Performance for VoIP on LTE System in Access Network....Pages 162-172 Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?....Pages 173-182 A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud....Pages 183-191 Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution....Pages 192-201 Information Systems Strategic Planning for a Naval Hospital....Pages 202-213 Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique....Pages 214-222 A Data-Driven Approach toward Building Dynamic Ontology....Pages 223-232 Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement....Pages 233-242 Secure and Verifiable Outsourcing of Sequence Comparisons....Pages 243-252 Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter....Pages 253-260 On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)....Pages 261-270 DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation....Pages 271-284 On Identifying Proper Security Mechanisms....Pages 285-294 A Recovery Approach for SQLite History Recorders from YAFFS2....Pages 295-299 UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors....Pages 300-305 SA4WSs: A Security Architecture for Web Services....Pages 306-311 Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation....Pages 312-317 A Test Case Generation Technique for VMM Fuzzing....Pages 318-323 A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet....Pages 324-330 A Proposal on Security Case Based on Common Criteria....Pages 331-336 An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors....Pages 337-342 Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks....Pages 343-352 Anonymous Lattice-Based Broadcast Encryption....Pages 353-362 Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance....Pages 363-372 New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation....Pages 373-382 Provably Secure and Subliminal-Free Variant of Schnorr Signature....Pages 383-391 A Block Cipher Mode of Operation with Two Keys....Pages 392-398 On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing....Pages 399-408 Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme....Pages 409-415 A Simplified Privacy Preserving Message Delivery Protocol in VDTNs....Pages 416-425 Confidentiality-Preserving Query Execution of Fragmented Outsourced Data....Pages 426-440 Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control....Pages 441-446 Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol....Pages 447-452 A Real-Time Privacy Amplification Scheme in Quantum Key Distribution....Pages 453-458 CSP-Based General Detection Model of Network Covert Storage Channels....Pages 459-468 Trustworthy Opportunistic Access to the Internet of Services....Pages 469-478 Architecture of Network Environment for High-Risk Security Experimentation....Pages 479-484 Emulation on the Internet Prefix Hijacking Attack Impaction....Pages 485-489 Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction....Pages 490-495 Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge....Pages 496-501 An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs....Pages 502-506 A Review of Security Attacks on the GSM Standard....Pages 507-512 An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation....Pages 513-518 Image Watermarking Using Psychovisual Threshold over the Edge....Pages 519-527 A Data Structure for Efficient Biometric Identification....Pages 528-533 The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System....Pages 534-539 Shifting Primes on OpenRISC Processors with Hardware Multiplier....Pages 540-549
File Attachment
LOADING LIST...
Availability
LOADING LIST...