Filter your results
- 62
- 1
- 62
- 1
- 63
- 53
- 63
- 63
- 1
- 4
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers
hal-01480199v1
|
||
|
CAPTCHA Suitable for Smartphones1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.131-140, ⟨10.1007/978-3-642-36818-9_14⟩
Conference papers
hal-01480158v1
|
||
|
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers
hal-01480185v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|
||
|
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers
hal-01480202v1
|
||
|
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.513-518, ⟨10.1007/978-3-642-36818-9_59⟩
Conference papers
hal-01480211v1
|
||
|
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers
hal-01480224v1
|
||
|
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.337-342, ⟨10.1007/978-3-642-36818-9_37⟩
Conference papers
hal-01480191v1
|
||
|
OSMF: A Framework for OSS Process Measurement1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.71-80, ⟨10.1007/978-3-642-36818-9_8⟩
Conference papers
hal-01480215v1
|
||
|
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers
hal-01480187v1
|
||
|
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.363-372, ⟨10.1007/978-3-642-36818-9_40⟩
Conference papers
hal-01480195v1
|
||
|
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.416-425, ⟨10.1007/978-3-642-36818-9_46⟩
Conference papers
hal-01480200v1
|
||
|
TransWiki: Supporting Translation Teaching1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.31-40, ⟨10.1007/978-3-642-36818-9_4⟩
Conference papers
hal-01480203v1
|
||
|
Architecture of Network Environment for High-Risk Security Experimentation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.479-484, ⟨10.1007/978-3-642-36818-9_53⟩
Conference papers
hal-01480206v1
|
||
|
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.91-100, ⟨10.1007/978-3-642-36818-9_10⟩
Conference papers
hal-01480222v1
|
||
|
Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.173-182, ⟨10.1007/978-3-642-36818-9_18⟩
Conference papers
hal-01480172v1
|
||
|
On Identifying Proper Security Mechanisms1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩
Conference papers
hal-01480182v1
|
||
|
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers
hal-01480204v1
|
||
|
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.409-415, ⟨10.1007/978-3-642-36818-9_45⟩
Conference papers
hal-01480254v1
|
||
|
SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.60-70, ⟨10.1007/978-3-642-36818-9_7⟩
Conference papers
hal-01480266v1
|
||
|
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.81-90, ⟨10.1007/978-3-642-36818-9_9⟩
Conference papers
hal-01480216v1
|
||
|
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.121-130, ⟨10.1007/978-3-642-36818-9_13⟩
Conference papers
hal-01480226v1
|
||
|
Indonesian Digital Natives1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.152-161, ⟨10.1007/978-3-642-36818-9_16⟩
Conference papers
hal-01480170v1
|
||
|
A Review of Security Attacks on the GSM Standard1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.507-512, ⟨10.1007/978-3-642-36818-9_58⟩
Conference papers
hal-01480210v1
|
||
|
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.41-49, ⟨10.1007/978-3-642-36818-9_5⟩
Conference papers
hal-01480212v1
|
||
|
Anonymous Lattice-Based Broadcast Encryption1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.353-362, ⟨10.1007/978-3-642-36818-9_39⟩
Conference papers
hal-01480192v1
|
||
|
Information Systems Strategic Planning for a Naval Hospital1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.202-213, ⟨10.1007/978-3-642-36818-9_21⟩
Conference papers
hal-01480176v1
|
||
|
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.233-242, ⟨10.1007/978-3-642-36818-9_24⟩
Conference papers
hal-01480178v1
|
||
|
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.441-446, ⟨10.1007/978-3-642-36818-9_48⟩
Conference papers
hal-01480201v1
|
||
|
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.534-539, ⟨10.1007/978-3-642-36818-9_62⟩
Conference papers
hal-01480214v1
|