default search action
ICT-EurAsia 2013: Yogyakarta, Indonesia
- Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You:
Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings. Lecture Notes in Computer Science 7804, Springer 2013, ISBN 978-3-642-36817-2
Information and Communication Technology- Eurasia Conference (ICT-EurAsia)
- Fathul Wahid:
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia. 1-10 - Ai Thao Nguyen Thi, Tran Khanh Dang:
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network. 11-20 - Khabib Mustofa, Yosua Albert Sir:
Early-Detection System for Cross-Language (Translated) Plagiarism. 21-30 - Robert P. Biuk-Aghai, Hari Venkatesan:
TransWiki: Supporting Translation Teaching. 31-40 - Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra:
Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework. 41-49 - Selo Sulistyo:
Software Development Methods in the Internet of Things. 50-59 - Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki:
SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications. 60-70 - Wikan Danar Sunindyo, Fajar Juang Ekaputra:
OSMF: A Framework for OSS Process Measurement. 71-80 - Susmit Bagchi:
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs. 81-90 - Suprapto, Retantyo Wardoyo:
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning. 91-100 - Chan Nam Ngo, Tran Khanh Dang:
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries. 101-110 - Thu Le Thi Bao, Tran Khanh Dang:
Semantic-Aware Obfuscation for Location Privacy at Database Level. 111-120 - Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang:
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch. 121-130 - Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura:
CAPTCHA Suitable for Smartphones. 131-140 - Pinaki Sarkar, Aritra Dhar:
Code Based KPD Scheme with Full Connectivity: Deterministic Merging. 141-151 - Neila Ramdhani, Wisnu Wiradhany:
Indonesian Digital Natives - ICT Usage Pattern Study across Different Age Groups. 152-161 - Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan:
End-to-End Delay Performance for VoIP on LTE System in Access Network. 162-172 - Faisal Syafar, Jing Gao:
Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required? 173-182 - Nguyen Quang-Hung, Pham Dac Nien, Nguyen Hoai Nam, Nguyen Huynh Tuong, Nam Thoai:
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud. 183-191 - Nungki Selviandro, Zainal Arifin Hasibuan:
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution. 192-201 - Hery Harjono Muljo, Bens Pardamean:
Information Systems Strategic Planning for a Naval Hospital. 202-213 - Wayan Suparta, Kemal Maulana Alhasa:
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique. 214-222 - Dhomas Hatta Fudholi, J. Wenny Rahayu, Eric Pardede, Hendrik:
A Data-Driven Approach toward Building Dynamic Ontology. 223-232 - Muhammad Asfand-e-yar, A Min Tjoa:
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement. 233-242
Asian Conference on Availability, Reliability and Security (AsiaARES)
- Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu:
Secure and Verifiable Outsourcing of Sequence Comparisons. 243-252 - Dongjin Choi, Ilsun You, Pankoo Kim:
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter. 253-260 - Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki:
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML). 261-270 - Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su:
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation. 271-284 - Jakub Breier, Ladislav Hudec:
On Identifying Proper Security Mechanisms. 285-294 - Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng:
A Recovery Approach for SQLite History Recorders from YAFFS2. 295-299 - Yuchao She, Hui Li, Hui Zhu:
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors. 300-305 - Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang:
SA4WSs: A Security Architecture for Web Services. 306-311 - Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu:
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation. 312-317 - Xiao Xia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang:
A Test Case Generation Technique for VMM Fuzzing. 318-323 - Thach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc Dinh Nguyen:
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet. 324-330 - Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka:
A Proposal on Security Case Based on Common Criteria. 331-336 - Wentao Jia, Rui Li, Chunyuan Zhang:
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors. 337-342 - Jostein Jensen:
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks. 343-352 - Adela Georgescu:
Anonymous Lattice-Based Broadcast Encryption. 353-362 - Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance. 363-372 - Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. 373-382 - Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu:
Provably Secure and Subliminal-Free Variant of Schnorr Signature. 383-391 - Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang:
A Block Cipher Mode of Operation with Two Keys. 392-398 - Ruxandra F. Olimid:
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. 399-408 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong:
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme. 409-415 - Youngho Park, Chul Sur, Kyung Hyune Rhee:
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs. 416-425 - Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez:
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data. 426-440 - Nisreen Alam Aldeen, Gerald Quirchmayr:
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control. 441-446 - Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol. 447-452 - Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You:
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution. 453-458 - Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li:
CSP-Based General Detection Model of Network Covert Storage Channels. 459-468 - Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You:
Trustworthy Opportunistic Access to the Internet of Services. 469-478 - Xiaohui Kuang, Xiang Li, Jinjing Zhao:
Architecture of Network Environment for High-Risk Security Experimentation. 479-484 - Jinjing Zhao, Yan Wen:
Emulation on the Internet Prefix Hijacking Attack Impaction. 485-489 - Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim:
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction. 490-495 - Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta:
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge. 496-501 - Huaqing Wen, Kyung Hyune Rhee:
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs. 502-506 - Giuseppe Cattaneo, Giancarlo De Maio, Pompeo Faruolo, Umberto Ferraro Petrillo:
A Review of Security Attacks on the GSM Standard. 507-512 - Huan Wang, Mingxing He, Xiao Li:
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation. 513-518 - Nur Azman Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib:
Image Watermarking Using Psychovisual Threshold over the Edge. 519-527 - Kensuke Baba, Serina Egawa:
A Data Structure for Efficient Biometric Identification. 528-533 - Hae-Min Moon, Sung Bum Pan:
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System. 534-539 - Leandro Marín, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta:
Shifting Primes on OpenRISC Processors with Hardware Multiplier. 540-549
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.