Table of Contents
|
Information and Communication Technology Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, IlsunYou (Eds.)
|
Front Matter |
Information and Communication Technology- Eurasia Conference (ICT-EurAsia)
|
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia Fathul Wahid |
1-10 |
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network Thi Nguyen, Tran Dang |
11-20 |
Early-Detection System for Cross-Language (Translated) Plagiarism Khabib Mustofa, Yosua Sir |
21-30 |
TransWiki: Supporting Translation Teaching Robert Biuk-Aghai, Hari Venkatesan |
31-40 |
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework Rajesri Govindaraju, Aulia Hadining, Dissa Chandra |
41-49 |
Software Development Methods in the Internet of Things Selo Sulistyo |
50-59 |
SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki |
60-70 |
OSMF: A Framework for OSS Process Measurement Wikan Sunindyo, Fajar Ekaputra |
71-80 |
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs Susmit Bagchi |
81-90 |
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning . Suprapto, Retantyo Wardoyo |
91-100 |
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries Chan Ngo, Tran Dang |
101-110 |
Semantic-Aware Obfuscation for Location Privacy at Database Level Thu Le, Tran Dang |
111-120 |
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch Tran Dang, Quynh Truong, Tran Dang |
121-130 |
CAPTCHA Suitable for Smartphones Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura |
131-140 |
Code Based KPD Scheme with Full Connectivity: Deterministic Merging Pinaki Sarkar, Aritra Dhar |
141-151 |
Indonesian Digital Natives Neila Ramdhani, Wisnu Wiradhany |
152-161 |
End-to-End Delay Performance for VoIP on LTE System in Access Network Ng Shen, Noraniah Aziz, Tutut Herawan |
162-172 |
Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required? Faisal Syafar, Jing Gao |
173-182 |
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud Nguyen Quang-Hung, Pham Nien, Nguyen Nam, Nguyen Huynh Tuong, Nam Thoai |
183-191 |
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution Nungki Selviandro, Zainal Hasibuan |
192-201 |
Information Systems Strategic Planning for a Naval Hospital Hery Muljo, Bens Pardamean |
202-213 |
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique Wayan Suparta, Kemal Alhasa |
214-222 |
A Data-Driven Approach toward Building Dynamic Ontology Dhomas Fudholi, Wenny Rahayu, Eric Pardede, . Hendrik |
223-232 |
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement Muhammad Asfand-E-Yar, A Tjoa |
233-242 |
Asian Conference on Availability, Reliability and Security (AsiaARES)
|
Secure and Verifiable Outsourcing of Sequence Comparisons Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu |
243-252 |
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter Dongjin Choi, Ilsun You, Pankoo Kim |
253-260 |
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki |
261-270 |
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su |
271-284 |
On Identifying Proper Security Mechanisms Jakub Breier, Ladislav Hudec |
285-294 |
A Recovery Approach for SQLite History Recorders from YAFFS2 Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng |
295-299 |
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors Yuchao She, Hui Li, Hui Zhu |
300-305 |
SA4WSs: A Security Architecture for Web Services Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang |
306-311 |
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siuming Yiu |
312-317 |
A Test Case Generation Technique for VMM Fuzzing Xiaoxia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang |
318-323 |
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet Thach Bui, Oanh Nguyen, Van Dang, Nhung Nguyen, Thuc Nguyen |
324-330 |
A Proposal on Security Case Based on Common Criteria Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka |
331-336 |
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors Wentao Jia, Rui Li, Chunyan Zhang |
337-342 |
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks Jostein Jensen |
343-352 |
Anonymous Lattice-Based Broadcast Encryption Adela Georgescu |
353-362 |
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance Amril Syalim, Takashi Nishide, Kouichi Sakurai |
363-372 |
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen |
373-382 |
Provably Secure and Subliminal-Free Variant of Schnorr Signature Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu |
383-391 |
A Block Cipher Mode of Operation with Two Keys Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang |
392-398 |
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing Ruxandra Olimid |
399-408 |
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong |
409-415 |
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs Youngho Park, Chul Sur, Kyung-Hyune Rhee |
416-425 |
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez |
426-440 |
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control Nisreen Aldeen, Gerald Quirchmayr |
441-446 |
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani |
447-452 |
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You |
453-458 |
CSP-Based General Detection Model of Network Covert Storage Channels Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li |
459-468 |
Trustworthy Opportunistic Access to the Internet of Services Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You |
469-478 |
Architecture of Network Environment for High-Risk Security Experimentation Xiaohui Kuang, Xiang Li, Jinjing Zhao |
479-484 |
Emulation on the Internet Prefix Hijacking Attack Impaction Jinjing Zhao, Yan Wen |
485-489 |
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim |
490-495 |
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta |
496-501 |
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs Huaqing Wen, Kyung-Hyune Rhee |
502-506 |
A Review of Security Attacks on the GSM Standard Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Petrillo |
507-512 |
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation Huan Wang, Mingxing He, Xiao Li |
513-518 |
Image Watermarking Using Psychovisual Threshold over the Edge Nur Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib |
519-527 |
A Data Structure for Efficient Biometric Identification Kensuke Baba, Serina Egawa |
528-533 |
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System Hae-Min Moon, Sung Pan |
534-539 |
Shifting Primes on OpenRISC Processors with Hardware Multiplier Leandro Marin, Antonio Jara, Antonio Skarmeta |
540-549 |