Filter your results
- 53
- 53
- 53
- 63
- 53
- 53
- 1
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
53 results
|
|
sorted by
|
|
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers
hal-01480181v1
|
||
|
A Recovery Approach for SQLite History Recorders from YAFFS21st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.295-299, ⟨10.1007/978-3-642-36818-9_30⟩
Conference papers
hal-01480183v1
|
||
|
Code Based KPD Scheme with Full Connectivity: Deterministic Merging1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.141-151, ⟨10.1007/978-3-642-36818-9_15⟩
Conference papers
hal-01480168v1
|
||
|
End-to-End Delay Performance for VoIP on LTE System in Access Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.162-172, ⟨10.1007/978-3-642-36818-9_17⟩
Conference papers
hal-01480171v1
|
||
|
A Test Case Generation Technique for VMM Fuzzing1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.318-323, ⟨10.1007/978-3-642-36818-9_34⟩
Conference papers
hal-01480188v1
|
||
|
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.1-10, ⟨10.1007/978-3-642-36818-9_1⟩
Conference papers
hal-01480174v1
|
||
|
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers
hal-01480180v1
|
||
|
SA4WSs: A Security Architecture for Web Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, ⟨10.1007/978-3-642-36818-9_32⟩
Conference papers
hal-01480186v1
|
||
|
Early-Detection System for Cross-Language (Translated) Plagiarism1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.21-30, ⟨10.1007/978-3-642-36818-9_3⟩
Conference papers
hal-01480193v1
|
||
|
A Block Cipher Mode of Operation with Two Keys1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.392-398, ⟨10.1007/978-3-642-36818-9_43⟩
Conference papers
hal-01480198v1
|
||
|
Emulation on the Internet Prefix Hijacking Attack Impaction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers
hal-01480207v1
|
||
|
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers
hal-01480208v1
|
||
|
A Data-Driven Approach toward Building Dynamic Ontology1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.223-232, ⟨10.1007/978-3-642-36818-9_23⟩
Conference papers
hal-01480229v1
|
||
|
A Proposal on Security Case Based on Common Criteria1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers
hal-01480190v1
|
||
|
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers
hal-01480199v1
|
||
|
CAPTCHA Suitable for Smartphones1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.131-140, ⟨10.1007/978-3-642-36818-9_14⟩
Conference papers
hal-01480158v1
|
||
|
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers
hal-01480185v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|
||
|
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers
hal-01480202v1
|
||
|
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers
hal-01480196v1
|
||
|
Provably Secure and Subliminal-Free Variant of Schnorr Signature1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers
hal-01480197v1
|
||
|
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.11-20, ⟨10.1007/978-3-642-36818-9_2⟩
Conference papers
hal-01480235v1
|
||
|
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.192-201, ⟨10.1007/978-3-642-36818-9_20⟩
Conference papers
hal-01480175v1
|
||
|
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.214-222, ⟨10.1007/978-3-642-36818-9_22⟩
Conference papers
hal-01480177v1
|
||
|
Image Watermarking Using Psychovisual Threshold over the Edge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.519-527, ⟨10.1007/978-3-642-36818-9_60⟩
Conference papers
hal-01480213v1
|
||
|
Semantic-Aware Obfuscation for Location Privacy at Database Level1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers
hal-01480225v1
|
||
|
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.324-330, ⟨10.1007/978-3-642-36818-9_35⟩
Conference papers
hal-01480238v1
|
||
|
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers
hal-01480209v1
|
||
|
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.513-518, ⟨10.1007/978-3-642-36818-9_59⟩
Conference papers
hal-01480211v1
|
||
|
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers
hal-01480224v1
|
- 1
- 2