Fr. 70.00

Information and Communication Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.

List of contents

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework.- Software Development Methods in the Internet of Things.- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping LicenseAgreement.- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving ClusteringProtocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribu

Summary

This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.

Product details

Assisted by A Min Tjoa et al (Editor), Khabib Mustofa (Editor), Eric Neuhold (Editor), Erich Neuhold (Editor), A Min Tjoa (Editor), A. Min Tjoa (Editor), Edgar Weippl (Editor), Edgar R. Weippl (Editor), Ilsun You (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 30.01.2013
 
EAN 9783642368172
ISBN 978-3-642-36817-2
No. of pages 552
Dimensions 160 mm x 236 mm x 30 mm
Weight 850 g
Illustrations XVI, 552 p. 170 illus.
Series Lecture Notes in Computer Science
Information Systems and Applications, incl. Internet/Web, and HCI
Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HC
Lecture Notes in Computer Science/Information Systems and Applications, incl. Internet/Web, and HCI
Lecture Notes in Computer Science
Information Systems and Applications, incl. Internet/Web, and HCI
Subjects Guides
Natural sciences, medicine, IT, technology > IT, data processing

C, Data Warehousing, computer science, Information Retrieval, Information Systems Applications (incl. Internet), Information Systems Applications (incl.Internet), Systems and Data Security, Data and Information Security, Computers and Society, Application software, Computer Communication Networks, Network Security, Computer security, Computers and civilization, Coding theory & cryptology, Internet searching, Information Storage and Retrieval, Data encryption, Data encryption (Computer science), Cryptology, Computer communication systems, Network hardware

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.