


default search action
ICT-EurAsia 2013: Yogyakarta, Indonesia
- Khabib Mustofa

, Erich J. Neuhold, A Min Tjoa
, Edgar R. Weippl, Ilsun You:
Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings. Lecture Notes in Computer Science 7804, Springer 2013, ISBN 978-3-642-36817-2
Information and Communication Technology- Eurasia Conference (ICT-EurAsia)
- Fathul Wahid

:
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia. 1-10 - Ai Thao Nguyen Thi, Tran Khanh Dang

:
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network. 11-20 - Khabib Mustofa

, Yosua Albert Sir:
Early-Detection System for Cross-Language (Translated) Plagiarism. 21-30 - Robert P. Biuk-Aghai

, Hari Venkatesan
:
TransWiki: Supporting Translation Teaching. 31-40 - Rajesri Govindaraju, Aulia F. Hadining

, Dissa R. Chandra
:
Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework. 41-49 - Selo Sulistyo

:
Software Development Methods in the Internet of Things. 50-59 - Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki:

SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications. 60-70 - Wikan Danar Sunindyo

, Fajar Juang Ekaputra
:
OSMF: A Framework for OSS Process Measurement. 71-80 - Susmit Bagchi

:
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs. 81-90 - Suprapto

, Retantyo Wardoyo
:
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning. 91-100 - Chan Nam Ngo

, Tran Khanh Dang
:
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries. 101-110 - Thu Le Thi Bao, Tran Khanh Dang

:
Semantic-Aware Obfuscation for Location Privacy at Database Level. 111-120 - Tran Tri Dang

, Quynh Chi Truong, Tran Khanh Dang
:
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch. 121-130 - Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura

:
CAPTCHA Suitable for Smartphones. 131-140 - Pinaki Sarkar, Aritra Dhar:

Code Based KPD Scheme with Full Connectivity: Deterministic Merging. 141-151 - Neila Ramdhani, Wisnu Wiradhany

:
Indonesian Digital Natives - ICT Usage Pattern Study across Different Age Groups. 152-161 - Ng Liang Shen

, Noraniah Abdul Aziz, Tutut Herawan
:
End-to-End Delay Performance for VoIP on LTE System in Access Network. 162-172 - Faisal Syafar

, Jing Gao
:
Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required? 173-182 - Nguyen Quang-Hung

, Pham Dac Nien, Nguyen Hoai Nam, Nguyen Huynh Tuong
, Nam Thoai:
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud. 183-191 - Nungki Selviandro

, Zainal Arifin Hasibuan
:
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution. 192-201 - Hery Harjono Muljo, Bens Pardamean

:
Information Systems Strategic Planning for a Naval Hospital. 202-213 - Wayan Suparta

, Kemal Maulana Alhasa
:
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique. 214-222 - Dhomas Hatta Fudholi

, J. Wenny Rahayu, Eric Pardede
, Hendrik
:
A Data-Driven Approach toward Building Dynamic Ontology. 223-232 - Muhammad Asfand-e-yar, A Min Tjoa

:
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement. 233-242
Asian Conference on Availability, Reliability and Security (AsiaARES)
- Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu:

Secure and Verifiable Outsourcing of Sequence Comparisons. 243-252 - Dongjin Choi, Ilsun You, Pankoo Kim:

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter. 253-260 - Bogdan Ksiezopolski

, Damian Rusinek, Adam Wierzbicki
:
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML). 261-270 - Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su:

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation. 271-284 - Jakub Breier

, Ladislav Hudec:
On Identifying Proper Security Mechanisms. 285-294 - Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng:

A Recovery Approach for SQLite History Recorders from YAFFS2. 295-299 - Yuchao She, Hui Li, Hui Zhu:

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors. 300-305 - Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang:

SA4WSs: A Security Architecture for Web Services. 306-311 - Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara

, Siu-Ming Yiu:
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation. 312-317 - Xiao Xia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang:

A Test Case Generation Technique for VMM Fuzzing. 318-323 - Thach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc Dinh Nguyen:

A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet. 324-330 - Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka:

A Proposal on Security Case Based on Common Criteria. 331-336 - Wentao Jia, Rui Li, Chunyuan Zhang:

An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors. 337-342 - Jostein Jensen:

Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks. 343-352 - Adela Georgescu:

Anonymous Lattice-Based Broadcast Encryption. 353-362 - Amril Syalim, Takashi Nishide, Kouichi Sakurai:

Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance. 363-372 - Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. 373-382 - Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu:

Provably Secure and Subliminal-Free Variant of Schnorr Signature. 383-391 - Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang:

A Block Cipher Mode of Operation with Two Keys. 392-398 - Ruxandra F. Olimid

:
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. 399-408 - Toan-Thinh Truong, Minh-Triet Tran

, Anh Duc Duong:
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme. 409-415 - Youngho Park, Chul Sur, Kyung Hyune Rhee:

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs. 416-425 - Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez

:
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data. 426-440 - Nisreen Alam Aldeen, Gerald Quirchmayr:

Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control. 441-446 - Sedigheh Abbasi, Stelvio Cimato

, Ernesto Damiani
:
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol. 447-452 - Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You:

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution. 453-458 - Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li:

CSP-Based General Detection Model of Network Covert Storage Channels. 459-468 - Alessandro Armando

, Aniello Castiglione
, Gabriele Costa
, Ugo Fiore
, Alessio Merlo, Luca Verderame
, Ilsun You:
Trustworthy Opportunistic Access to the Internet of Services. 469-478 - Xiaohui Kuang, Xiang Li, Jinjing Zhao:

Architecture of Network Environment for High-Risk Security Experimentation. 479-484 - Jinjing Zhao, Yan Wen:

Emulation on the Internet Prefix Hijacking Attack Impaction. 485-489 - Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim:

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction. 490-495 - Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta:

Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge. 496-501 - Huaqing Wen, Kyung Hyune Rhee:

An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs. 502-506 - Giuseppe Cattaneo

, Giancarlo De Maio, Pompeo Faruolo, Umberto Ferraro Petrillo
:
A Review of Security Attacks on the GSM Standard. 507-512 - Huan Wang, Mingxing He, Xiao Li:

An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation. 513-518 - Nur Azman Abu

, Ferda Ernawan
, Nanna Suryana
, Shahrin Sahib:
Image Watermarking Using Psychovisual Threshold over the Edge. 519-527 - Kensuke Baba

, Serina Egawa:
A Data Structure for Efficient Biometric Identification. 528-533 - Hae-Min Moon, Sung Bum Pan:

The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System. 534-539 - Leandro Marín, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta

:
Shifting Primes on OpenRISC Processors with Hardware Multiplier. 540-549

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














