Bahan Pustaka Digital Universitas Bakrie
Book's Detail
Information and communication technology: international conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013 : proceedings | |
---|---|
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. |
|
Statement of Responsibility | |
Author(s) | ICT-EurAsia (Conference) (2013 : Yogyakarta, Indonesia) - Conference Mustofa, Khabib - Personal Name Neuhold, Erich J. - Personal Name Tjoa, A Min - Personal Name Weippl, Edgar R. - Personal Name You, Ilsun - Personal Name |
Edition | |
Call Number | [PRO-TIF-007] |
Subject(s) | Congresses Computer networks Software engineering |
Language | English |
Publisher | Springer-Verlag Berlin Heidelberg |
Publishing Year | 2013 |
Specific Detail Info | Table of contents : Front Matter....Pages - Translating the Idea of the eGovernment One-Stop-Shop in Indonesia....Pages 1-10 A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network....Pages 11-20 Early-Detection System for Cross-Language (Translated) Plagiarism....Pages 21-30 TransWiki: Supporting Translation Teaching....Pages 31-40 Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework....Pages 41-49 Software Development Methods in the Internet of Things....Pages 50-59 SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications....Pages 60-70 OSMF: A Framework for OSS Process Measurement....Pages 71-80 Analyzing Stability of Algorithmic Systems Using Algebraic Constructs....Pages 81-90 Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning....Pages 91-100 On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries....Pages 101-110 Semantic-Aware Obfuscation for Location Privacy at Database Level....Pages 111-120 Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch....Pages 121-130 CAPTCHA Suitable for Smartphones....Pages 131-140 Code Based KPD Scheme with Full Connectivity: Deterministic Merging....Pages 141-151 Indonesian Digital Natives....Pages 152-161 End-to-End Delay Performance for VoIP on LTE System in Access Network....Pages 162-172 Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?....Pages 173-182 A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud....Pages 183-191 Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution....Pages 192-201 Information Systems Strategic Planning for a Naval Hospital....Pages 202-213 Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique....Pages 214-222 A Data-Driven Approach toward Building Dynamic Ontology....Pages 223-232 Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement....Pages 233-242 Secure and Verifiable Outsourcing of Sequence Comparisons....Pages 243-252 Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter....Pages 253-260 On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)....Pages 261-270 DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation....Pages 271-284 On Identifying Proper Security Mechanisms....Pages 285-294 A Recovery Approach for SQLite History Recorders from YAFFS2....Pages 295-299 UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors....Pages 300-305 SA4WSs: A Security Architecture for Web Services....Pages 306-311 Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation....Pages 312-317 A Test Case Generation Technique for VMM Fuzzing....Pages 318-323 A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet....Pages 324-330 A Proposal on Security Case Based on Common Criteria....Pages 331-336 An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors....Pages 337-342 Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks....Pages 343-352 Anonymous Lattice-Based Broadcast Encryption....Pages 353-362 Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance....Pages 363-372 New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation....Pages 373-382 Provably Secure and Subliminal-Free Variant of Schnorr Signature....Pages 383-391 A Block Cipher Mode of Operation with Two Keys....Pages 392-398 On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing....Pages 399-408 Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme....Pages 409-415 A Simplified Privacy Preserving Message Delivery Protocol in VDTNs....Pages 416-425 Confidentiality-Preserving Query Execution of Fragmented Outsourced Data....Pages 426-440 Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control....Pages 441-446 Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol....Pages 447-452 A Real-Time Privacy Amplification Scheme in Quantum Key Distribution....Pages 453-458 CSP-Based General Detection Model of Network Covert Storage Channels....Pages 459-468 Trustworthy Opportunistic Access to the Internet of Services....Pages 469-478 Architecture of Network Environment for High-Risk Security Experimentation....Pages 479-484 Emulation on the Internet Prefix Hijacking Attack Impaction....Pages 485-489 Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction....Pages 490-495 Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge....Pages 496-501 An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs....Pages 502-506 A Review of Security Attacks on the GSM Standard....Pages 507-512 An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation....Pages 513-518 Image Watermarking Using Psychovisual Threshold over the Edge....Pages 519-527 A Data Structure for Efficient Biometric Identification....Pages 528-533 The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System....Pages 534-539 Shifting Primes on OpenRISC Processors with Hardware Multiplier....Pages 540-549 |
File Attachment | LOADING LIST... |
Availability | LOADING LIST... |