Information and Communicatiaon Technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revis...
Enregistré dans:
Auteurs principaux : | , , , , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Information and Communicatiaon Technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / edited by Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Information Systems and Applications, incl. Internet/Web, and HCI ; 7804 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Information and Communicatiaon Technology Autre format: Information and Communication Technology |
LEADER | 12168clm a2200721 4500 | ||
---|---|---|---|
001 | PPN169139670 | ||
003 | http://www.sudoc.fr/169139670 | ||
005 | 20241001155300.0 | ||
010 | |a 978-3-642-36818-9 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-36818-9 |2 DOI |
035 | |a (OCoLC)847121237 | ||
035 | |a Springer978-3-642-36818-9 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-36818-9 | ||
035 | |a Springer-11645-978-3-642-36818-9 | ||
100 | |a 20130507d2013 u u0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Information and Communicatiaon Technology |e International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings |f edited by Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Information Systems and Applications, incl |i Internet/Web, and HCI |x 2946-1642 |v 7804 | |
330 | |a This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security. | ||
359 | 1 | |a Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians Adoption of Electronic Medical Records: Model Development Using Ability Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping LicenseAgreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping Provenance of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving ClusteringProtocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians Adoption of Electronic Medical Records: Model Development Using Ability Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction ofFace-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-PurposeMany-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping Provenance of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Pro | |
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Information Systems and Applications, incl. Internet/Web, and HCI |x 2946-1642 |v 7804 | |
452 | | | |t Information and Communicatiaon Technology |b Texte imprimé |y 9783642368172 | |
452 | | | |t Information and Communication Technology |b Texte imprimé |y 9783642368196 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Information Systems Applications (incl. Internet) | |
610 | 2 | |a Computers and Society | |
610 | 2 | |a Information Storage and Retrieval | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Cryptology. | |
610 | 2 | |a Computer and Information Systems Applications | |
610 | 2 | |a Data and Information Security | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 004 |v 23 | ||
680 | |a QA76.9.C66 | ||
700 | 1 | |a Mustofa |b Khabib |4 651 | |
701 | 1 | |3 PPN231690649 |a Neuhold |b Erich J. |f 19..-.... |4 651 | |
701 | 1 | |3 PPN076470733 |a Tjoa |b A. Min |f 1952-.... |4 651 | |
701 | 1 | |3 PPN098579878 |a Weippl |b Edgar R. |4 651 | |
701 | 1 | |a You |b Ilsun |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20240603 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-36818-9 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-89L6JFBN-S |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:830857702 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-36818-9 | |
915 | |5 441099901:830857702 |b SPRING13-00789 | ||
930 | |5 441099901:830857702 |b 441099901 |j g | ||
991 | |5 441099901:830857702 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:14 | ||
997 | |a NUM |b SPRING13-00789 |d NUMpivo |e EM |s d | ||
998 | |a 978627 |