index - Information and Communication Technology Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information and Communication Technology
Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, IlsunYou (Eds.)
Front Matter

Information and Communication Technology- Eurasia Conference (ICT-EurAsia)


Translating the Idea of the eGovernment One-Stop-Shop in Indonesia
Fathul Wahid
1-10
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network
Thi Nguyen, Tran Dang
11-20
Early-Detection System for Cross-Language (Translated) Plagiarism
Khabib Mustofa, Yosua Sir
21-30
TransWiki: Supporting Translation Teaching
Robert Biuk-Aghai, Hari Venkatesan
31-40
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework
Rajesri Govindaraju, Aulia Hadining, Dissa Chandra
41-49
Software Development Methods in the Internet of Things
Selo Sulistyo
50-59
SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications
Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki
60-70
OSMF: A Framework for OSS Process Measurement
Wikan Sunindyo, Fajar Ekaputra
71-80
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs
Susmit Bagchi
81-90
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning
. Suprapto, Retantyo Wardoyo
91-100
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries
Chan Ngo, Tran Dang
101-110
Semantic-Aware Obfuscation for Location Privacy at Database Level
Thu Le, Tran Dang
111-120
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch
Tran Dang, Quynh Truong, Tran Dang
121-130
CAPTCHA Suitable for Smartphones
Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura
131-140
Code Based KPD Scheme with Full Connectivity: Deterministic Merging
Pinaki Sarkar, Aritra Dhar
141-151
Indonesian Digital Natives
Neila Ramdhani, Wisnu Wiradhany
152-161
End-to-End Delay Performance for VoIP on LTE System in Access Network
Ng Shen, Noraniah Aziz, Tutut Herawan
162-172
Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?
Faisal Syafar, Jing Gao
173-182
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud
Nguyen Quang-Hung, Pham Nien, Nguyen Nam, Nguyen Huynh Tuong, Nam Thoai
183-191
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution
Nungki Selviandro, Zainal Hasibuan
192-201
Information Systems Strategic Planning for a Naval Hospital
Hery Muljo, Bens Pardamean
202-213
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique
Wayan Suparta, Kemal Alhasa
214-222
A Data-Driven Approach toward Building Dynamic Ontology
Dhomas Fudholi, Wenny Rahayu, Eric Pardede, . Hendrik
223-232
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement
Muhammad Asfand-E-Yar, A Tjoa
233-242

Asian Conference on Availability, Reliability and Security (AsiaARES)


Secure and Verifiable Outsourcing of Sequence Comparisons
Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu
243-252
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter
Dongjin Choi, Ilsun You, Pankoo Kim
253-260
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)
Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki
261-270
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation
Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su
271-284
On Identifying Proper Security Mechanisms
Jakub Breier, Ladislav Hudec
285-294
A Recovery Approach for SQLite History Recorders from YAFFS2
Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng
295-299
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors
Yuchao She, Hui Li, Hui Zhu
300-305
SA4WSs: A Security Architecture for Web Services
Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang
306-311
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation
Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siuming Yiu
312-317
A Test Case Generation Technique for VMM Fuzzing
Xiaoxia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang
318-323
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet
Thach Bui, Oanh Nguyen, Van Dang, Nhung Nguyen, Thuc Nguyen
324-330
A Proposal on Security Case Based on Common Criteria
Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka
331-336
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors
Wentao Jia, Rui Li, Chunyan Zhang
337-342
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks
Jostein Jensen
343-352
Anonymous Lattice-Based Broadcast Encryption
Adela Georgescu
353-362
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance
Amril Syalim, Takashi Nishide, Kouichi Sakurai
363-372
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation
Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen
373-382
Provably Secure and Subliminal-Free Variant of Schnorr Signature
Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu
383-391
A Block Cipher Mode of Operation with Two Keys
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang
392-398
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
Ruxandra Olimid
399-408
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme
Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong
409-415
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs
Youngho Park, Chul Sur, Kyung-Hyune Rhee
416-425
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data
Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez
426-440
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control
Nisreen Aldeen, Gerald Quirchmayr
441-446
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol
Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani
447-452
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution
Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You
453-458
CSP-Based General Detection Model of Network Covert Storage Channels
Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li
459-468
Trustworthy Opportunistic Access to the Internet of Services
Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You
469-478
Architecture of Network Environment for High-Risk Security Experimentation
Xiaohui Kuang, Xiang Li, Jinjing Zhao
479-484
Emulation on the Internet Prefix Hijacking Attack Impaction
Jinjing Zhao, Yan Wen
485-489
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction
Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim
490-495
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge
Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta
496-501
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs
Huaqing Wen, Kyung-Hyune Rhee
502-506
A Review of Security Attacks on the GSM Standard
Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Petrillo
507-512
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation
Huan Wang, Mingxing He, Xiao Li
513-518
Image Watermarking Using Psychovisual Threshold over the Edge
Nur Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib
519-527
A Data Structure for Efficient Biometric Identification
Kensuke Baba, Serina Egawa
528-533
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System
Hae-Min Moon, Sung Pan
534-539
Shifting Primes on OpenRISC Processors with Hardware Multiplier
Leandro Marin, Antonio Jara, Antonio Skarmeta
540-549

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/