Full Text Documents

Search


Table of Contents
Information and Communication Technology
Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, IlsunYou (Eds.)
Front Matter

Information and Communication Technology- Eurasia Conference (ICT-EurAsia)


Translating the Idea of the eGovernment One-Stop-Shop in Indonesia
Fathul Wahid
1-10
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network
Thi Nguyen, Tran Dang
11-20
Early-Detection System for Cross-Language (Translated) Plagiarism
Khabib Mustofa, Yosua Sir
21-30
TransWiki: Supporting Translation Teaching
Robert Biuk-Aghai, Hari Venkatesan
31-40
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework
Rajesri Govindaraju, Aulia Hadining, Dissa Chandra
41-49
Software Development Methods in the Internet of Things
Selo Sulistyo
50-59
SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications
Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki
60-70
OSMF: A Framework for OSS Process Measurement
Wikan Sunindyo, Fajar Ekaputra
71-80
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs
Susmit Bagchi
81-90
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning
. Suprapto, Retantyo Wardoyo
91-100
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries
Chan Ngo, Tran Dang
101-110
Semantic-Aware Obfuscation for Location Privacy at Database Level
Thu Le, Tran Dang
111-120
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch
Tran Dang, Quynh Truong, Tran Dang
121-130
CAPTCHA Suitable for Smartphones
Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura
131-140
Code Based KPD Scheme with Full Connectivity: Deterministic Merging
Pinaki Sarkar, Aritra Dhar
141-151
Indonesian Digital Natives
Neila Ramdhani, Wisnu Wiradhany
152-161
End-to-End Delay Performance for VoIP on LTE System in Access Network
Ng Shen, Noraniah Aziz, Tutut Herawan
162-172
Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?
Faisal Syafar, Jing Gao
173-182
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud
Nguyen Quang-Hung, Pham Nien, Nguyen Nam, Nguyen Huynh Tuong, Nam Thoai
183-191
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution
Nungki Selviandro, Zainal Hasibuan
192-201
Information Systems Strategic Planning for a Naval Hospital
Hery Muljo, Bens Pardamean
202-213
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique
Wayan Suparta, Kemal Alhasa
214-222
A Data-Driven Approach toward Building Dynamic Ontology
Dhomas Fudholi, Wenny Rahayu, Eric Pardede, . Hendrik
223-232
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement
Muhammad Asfand-E-Yar, A Tjoa
233-242

Asian Conference on Availability, Reliability and Security (AsiaARES)


Secure and Verifiable Outsourcing of Sequence Comparisons
Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu
243-252
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter
Dongjin Choi, Ilsun You, Pankoo Kim
253-260
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)
Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki
261-270
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation
Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su
271-284
On Identifying Proper Security Mechanisms
Jakub Breier, Ladislav Hudec
285-294
A Recovery Approach for SQLite History Recorders from YAFFS2
Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng
295-299
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors
Yuchao She, Hui Li, Hui Zhu
300-305
SA4WSs: A Security Architecture for Web Services
Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang
306-311
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation
Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siuming Yiu
312-317
A Test Case Generation Technique for VMM Fuzzing
Xiaoxia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang
318-323
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet
Thach Bui, Oanh Nguyen, Van Dang, Nhung Nguyen, Thuc Nguyen
324-330
A Proposal on Security Case Based on Common Criteria
Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka
331-336
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors
Wentao Jia, Rui Li, Chunyan Zhang
337-342
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks
Jostein Jensen
343-352
Anonymous Lattice-Based Broadcast Encryption
Adela Georgescu
353-362
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance
Amril Syalim, Takashi Nishide, Kouichi Sakurai
363-372
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation
Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen
373-382
Provably Secure and Subliminal-Free Variant of Schnorr Signature
Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu
383-391
A Block Cipher Mode of Operation with Two Keys
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang
392-398
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
Ruxandra Olimid
399-408
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme
Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong
409-415
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs
Youngho Park, Chul Sur, Kyung-Hyune Rhee
416-425
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data
Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez
426-440
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control
Nisreen Aldeen, Gerald Quirchmayr
441-446
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol
Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani
447-452
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution
Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You
453-458
CSP-Based General Detection Model of Network Covert Storage Channels
Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li
459-468
Trustworthy Opportunistic Access to the Internet of Services
Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You
469-478
Architecture of Network Environment for High-Risk Security Experimentation
Xiaohui Kuang, Xiang Li, Jinjing Zhao
479-484
Emulation on the Internet Prefix Hijacking Attack Impaction
Jinjing Zhao, Yan Wen
485-489
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction
Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim
490-495
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge
Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta
496-501
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs
Huaqing Wen, Kyung-Hyune Rhee
502-506
A Review of Security Attacks on the GSM Standard
Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Petrillo
507-512
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation
Huan Wang, Mingxing He, Xiao Li
513-518
Image Watermarking Using Psychovisual Threshold over the Edge
Nur Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib
519-527
A Data Structure for Efficient Biometric Identification
Kensuke Baba, Serina Egawa
528-533
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System
Hae-Min Moon, Sung Pan
534-539
Shifting Primes on OpenRISC Processors with Hardware Multiplier
Leandro Marin, Antonio Jara, Antonio Skarmeta
540-549

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/