Search - Information and Communication Technology Access content directly

Filter your results

63 results
Contributor/author Internal identifier : 200187
Image document

Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol

Sedigheh Abbasi , Stelvio Cimato , Ernesto Damiani
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers hal-01480202v1
Image document

Image Watermarking Using Psychovisual Threshold over the Edge

Nur Azman Abu , Ferda Ernawan , Nanna Suryana , Shahrin Sahib
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.519-527, ⟨10.1007/978-3-642-36818-9_60⟩
Conference papers hal-01480213v1
Image document

Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control

Nisreen Alam Aldeen , Gerald Quirchmayr
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.441-446, ⟨10.1007/978-3-642-36818-9_48⟩
Conference papers hal-01480201v1
Image document

Trustworthy Opportunistic Access to the Internet of Services

Alessandro Armando , Aniello Castiglione , Gabriele Costa , Ugo Fiore , Alessio Merlo , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers hal-01480255v1
Image document

Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement

Muhammad Asfand-E-Yar , A Min Tjoa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.233-242, ⟨10.1007/978-3-642-36818-9_24⟩
Conference papers hal-01480178v1
Image document

A Data Structure for Efficient Biometric Identification

Kensuke Baba , Serina Egawa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.528-533, ⟨10.1007/978-3-642-36818-9_61⟩
Conference papers hal-01480259v1
Image document

Analyzing Stability of Algorithmic Systems Using Algebraic Constructs

Susmit Bagchi
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.81-90, ⟨10.1007/978-3-642-36818-9_9⟩
Conference papers hal-01480216v1
Image document

TransWiki: Supporting Translation Teaching

Robert P. Biuk-Aghai , Hari Venkatesan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.31-40, ⟨10.1007/978-3-642-36818-9_4⟩
Conference papers hal-01480203v1
Image document

On Identifying Proper Security Mechanisms

Jakub Breier , Ladislav Hudec
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩
Conference papers hal-01480182v1
Image document

A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet

Thach V. Bui , Oanh K. Nguyen , Van H. Dang , Nhung H. Nguyen , Thuc D. Nguyen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.324-330, ⟨10.1007/978-3-642-36818-9_35⟩
Conference papers hal-01480238v1
Image document

A Review of Security Attacks on the GSM Standard

Giuseppe Cattaneo , Giancarlo De Maio , Pompeo Faruolo , Umberto Ferraro Petrillo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.507-512, ⟨10.1007/978-3-642-36818-9_58⟩
Conference papers hal-01480210v1
Image document

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter

Dongjin Choi , Ilsun You , Pankoo Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers hal-01480180v1
Image document

Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch

Tran Tri Dang , Quynh Chi Truong , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.121-130, ⟨10.1007/978-3-642-36818-9_13⟩
Conference papers hal-01480226v1
Image document

Secure and Verifiable Outsourcing of Sequence Comparisons

Yansheng Feng , Hua Ma , Xiaofeng Chen , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.243-252, ⟨10.1007/978-3-642-36818-9_25⟩
Conference papers hal-01480179v1
Image document

A Data-Driven Approach toward Building Dynamic Ontology

Dhomas Hatta Fudholi , Wenny Rahayu , Eric Pardede , . Hendrik
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.223-232, ⟨10.1007/978-3-642-36818-9_23⟩
Conference papers hal-01480229v1
Image document

Anonymous Lattice-Based Broadcast Encryption

Adela Georgescu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.353-362, ⟨10.1007/978-3-642-36818-9_39⟩
Conference papers hal-01480192v1
Image document

Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework

Rajesri Govindaraju , Aulia F. Hadining , Dissa R. Chandra
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.41-49, ⟨10.1007/978-3-642-36818-9_5⟩
Conference papers hal-01480212v1
Image document

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Shuhui Hou , Ryoichi Sasaki , Tetsutaro Uehara , Siuming Yiu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers hal-01480187v1
Image document

A Block Cipher Mode of Operation with Two Keys

Yi-Li Huang , Fang-Yie Leu , Jung-Chun Liu , Jing-Hao Yang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.392-398, ⟨10.1007/978-3-642-36818-9_43⟩
Conference papers hal-01480198v1
Image document

Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks

Jostein Jensen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.343-352, ⟨10.1007/978-3-642-36818-9_38⟩
Conference papers hal-01480241v1
Image document

An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors

Wentao Jia , Rui Li , Chunyan Zhang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.337-342, ⟨10.1007/978-3-642-36818-9_37⟩
Conference papers hal-01480191v1
Image document

On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)

Bogdan Ksiezopolski , Damian Rusinek , Adam Wierzbicki
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.261-270, ⟨10.1007/978-3-642-36818-9_27⟩
Conference papers hal-01480233v1
Image document

Architecture of Network Environment for High-Risk Security Experimentation

Xiaohui Kuang , Xiang Li , Jinjing Zhao
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.479-484, ⟨10.1007/978-3-642-36818-9_53⟩
Conference papers hal-01480206v1
Image document

Semantic-Aware Obfuscation for Location Privacy at Database Level

Thu Bao Le , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers hal-01480225v1
Image document

SA4WSs: A Security Architecture for Web Services

Lingxia Liu , Dongxia Wang , Jinjing Zhao , Minhuan Huang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, ⟨10.1007/978-3-642-36818-9_32⟩
Conference papers hal-01480186v1
Image document

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution

Bo Liu , Bo Liu , Baokang Zhao , Dingjie Zou , Chunqing Wu , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers hal-01480204v1
Image document

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation

Huabiao Lu , Baokang Zhao , Xiaofeng Wang , Jinshu Su
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers hal-01480181v1
Image document

Shifting Primes on OpenRISC Processors with Hardware Multiplier

Leandro Marin , Antonio J. Jara , Antonio Skarmeta
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.540-549, ⟨10.1007/978-3-642-36818-9_63⟩
Conference papers hal-01480261v1
Image document

Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge

Sarbari Mitra , Sourav Mukhopadhyay , Ratna Dutta
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers hal-01480209v1
Image document

The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System

Hae-Min Moon , Sung Bum Pan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.534-539, ⟨10.1007/978-3-642-36818-9_62⟩
Conference papers hal-01480214v1