000 13578nam a22006855i 4500
001 978-3-642-36818-9
003 DE-He213
005 20240730193917.0
007 cr nn 008mamaa
008 130305s2013 gw | s |||| 0|eng d
020 _a9783642368189
_9978-3-642-36818-9
024 7 _a10.1007/978-3-642-36818-9
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
072 7 _aUBJ
_2thema
082 0 4 _a303.4834
_223
245 1 0 _aInformation and Communication Technology
_h[electronic resource] :
_bInternational Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings /
_cedited by Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You.
250 _a1st ed. 2013.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2013.
300 _aXVI, 552 p. 170 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v7804
505 0 _aTranslating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping LicenseAgreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving ClusteringProtocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction ofFace-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-PurposeMany-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret
505 0 _aSharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent SurveillanceSystem.- Shifting Primes.
520 _aThis book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
650 0 _aComputers and civilization.
_921733
650 0 _aData protection.
_97245
650 0 _aInformation storage and retrieval systems.
_922213
650 0 _aApplication software.
_9154941
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 1 4 _aComputers and Society.
_931668
650 2 4 _aData and Information Security.
_931990
650 2 4 _aInformation Storage and Retrieval.
_923927
650 2 4 _aComputer and Information Systems Applications.
_9154942
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9154943
700 1 _aMustofa, Khabib.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9154944
700 1 _aNeuhold, Erich.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9154945
700 1 _aTjoa, A Min.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9154946
700 1 _aWeippl, Edgar R.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9154947
700 1 _aYou, Ilsun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9154948
710 2 _aSpringerLink (Online service)
_9154949
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642368172
776 0 8 _iPrinted edition:
_z9783642368196
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v7804
_9154950
856 4 0 _uhttps://doi.org/10.1007/978-3-642-36818-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c94923
_d94923