Search - Information and Communication Technology Access content directly

Filter your results

63 results
Contributor/author Internal identifier : 200187
Image document

On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing

Ruxandra F. Olimid
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers hal-01480199v1
Image document

CAPTCHA Suitable for Smartphones

Yusuke Tsuruta , Mayumi Takaya , Akihiro Yamamura
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.131-140, ⟨10.1007/978-3-642-36818-9_14⟩
Conference papers hal-01480158v1
Image document

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors

Yuchao She , Hui Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers hal-01480185v1
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1
Image document

Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol

Sedigheh Abbasi , Stelvio Cimato , Ernesto Damiani
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers hal-01480202v1
Image document

An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation

Huan Wang , Mingxing He , Xiao Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.513-518, ⟨10.1007/978-3-642-36818-9_59⟩
Conference papers hal-01480211v1
Image document

On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries

Chan Nam Ngo , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers hal-01480224v1
Image document

An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors

Wentao Jia , Rui Li , Chunyan Zhang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.337-342, ⟨10.1007/978-3-642-36818-9_37⟩
Conference papers hal-01480191v1
Image document

OSMF: A Framework for OSS Process Measurement

Wikan Danar Sunindyo , Fajar Juang Ekaputra
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.71-80, ⟨10.1007/978-3-642-36818-9_8⟩
Conference papers hal-01480215v1
Image document

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Shuhui Hou , Ryoichi Sasaki , Tetsutaro Uehara , Siuming Yiu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers hal-01480187v1
Image document

Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance

Amril Syalim , Takashi Nishide , Kouichi Sakurai
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.363-372, ⟨10.1007/978-3-642-36818-9_40⟩
Conference papers hal-01480195v1
Image document

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs

Youngho Park , Chul Sur , Kyung-Hyune Rhee
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.416-425, ⟨10.1007/978-3-642-36818-9_46⟩
Conference papers hal-01480200v1
Image document

TransWiki: Supporting Translation Teaching

Robert P. Biuk-Aghai , Hari Venkatesan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.31-40, ⟨10.1007/978-3-642-36818-9_4⟩
Conference papers hal-01480203v1
Image document

Architecture of Network Environment for High-Risk Security Experimentation

Xiaohui Kuang , Xiang Li , Jinjing Zhao
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.479-484, ⟨10.1007/978-3-642-36818-9_53⟩
Conference papers hal-01480206v1
Image document

Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning

. Suprapto , Retantyo Wardoyo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.91-100, ⟨10.1007/978-3-642-36818-9_10⟩
Conference papers hal-01480222v1
Image document

Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?

Faisal Syafar , Jing Gao
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.173-182, ⟨10.1007/978-3-642-36818-9_18⟩
Conference papers hal-01480172v1
Image document

On Identifying Proper Security Mechanisms

Jakub Breier , Ladislav Hudec
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩
Conference papers hal-01480182v1
Image document

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution

Bo Liu , Bo Liu , Baokang Zhao , Dingjie Zou , Chunqing Wu , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers hal-01480204v1
Image document

Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme

Toan-Thinh Truong , Minh-Triet Tran , Anh-Duc Duong
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.409-415, ⟨10.1007/978-3-642-36818-9_45⟩
Conference papers hal-01480254v1
Image document

SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications

Masaya Shimakawa , Shigeki Hagihara , Naoki Yonezaki
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.60-70, ⟨10.1007/978-3-642-36818-9_7⟩
Conference papers hal-01480266v1
Image document

Analyzing Stability of Algorithmic Systems Using Algebraic Constructs

Susmit Bagchi
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.81-90, ⟨10.1007/978-3-642-36818-9_9⟩
Conference papers hal-01480216v1
Image document

Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch

Tran Tri Dang , Quynh Chi Truong , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.121-130, ⟨10.1007/978-3-642-36818-9_13⟩
Conference papers hal-01480226v1
Image document

Indonesian Digital Natives

Neila Ramdhani , Wisnu Wiradhany
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.152-161, ⟨10.1007/978-3-642-36818-9_16⟩
Conference papers hal-01480170v1
Image document

A Review of Security Attacks on the GSM Standard

Giuseppe Cattaneo , Giancarlo De Maio , Pompeo Faruolo , Umberto Ferraro Petrillo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.507-512, ⟨10.1007/978-3-642-36818-9_58⟩
Conference papers hal-01480210v1
Image document

Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework

Rajesri Govindaraju , Aulia F. Hadining , Dissa R. Chandra
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.41-49, ⟨10.1007/978-3-642-36818-9_5⟩
Conference papers hal-01480212v1
Image document

Anonymous Lattice-Based Broadcast Encryption

Adela Georgescu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.353-362, ⟨10.1007/978-3-642-36818-9_39⟩
Conference papers hal-01480192v1
Image document

Information Systems Strategic Planning for a Naval Hospital

Hery Harjono Muljo , Bens Pardamean
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.202-213, ⟨10.1007/978-3-642-36818-9_21⟩
Conference papers hal-01480176v1
Image document

Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement

Muhammad Asfand-E-Yar , A Min Tjoa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.233-242, ⟨10.1007/978-3-642-36818-9_24⟩
Conference papers hal-01480178v1
Image document

Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control

Nisreen Alam Aldeen , Gerald Quirchmayr
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.441-446, ⟨10.1007/978-3-642-36818-9_48⟩
Conference papers hal-01480201v1
Image document

The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System

Hae-Min Moon , Sung Bum Pan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.534-539, ⟨10.1007/978-3-642-36818-9_62⟩
Conference papers hal-01480214v1