Search - Information and Communication Technology Access content directly

Filter your results

63 results
Contributor/author Internal identifier : 200187
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1
Image document

Emulation on the Internet Prefix Hijacking Attack Impaction

Jinjing Zhao , Yan Wen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers hal-01480207v1
Image document

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction

Lu Zhao , Ho-Seok Kang , Sung-Ryul Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers hal-01480208v1
Image document

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Yinghui Zhang , Hui Li , Xiaoqing Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers hal-01480197v1
Image document

A Proposal on Security Case Based on Common Criteria

Shuichiro Yamamoto , Tomoko Kaneko , Hidehiko Tanaka
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers hal-01480190v1
Image document

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

Xingxing Xie , Hua Ma , Jin Li , Xiaofeng Chen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers hal-01480196v1
Image document

A Recovery Approach for SQLite History Recorders from YAFFS2

Beibei Wu , Ming Xu , Haiping Zhang , Jian Xu , Yizhi Ren , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.295-299, ⟨10.1007/978-3-642-36818-9_30⟩
Conference papers hal-01480183v1
Image document

An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs

Huaqing Wen , Kyung-Hyune Rhee
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.502-506, ⟨10.1007/978-3-642-36818-9_57⟩
Conference papers hal-01480257v1
Image document

An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation

Huan Wang , Mingxing He , Xiao Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.513-518, ⟨10.1007/978-3-642-36818-9_59⟩
Conference papers hal-01480211v1
Image document

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia

Fathul Wahid
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.1-10, ⟨10.1007/978-3-642-36818-9_1⟩
Conference papers hal-01480174v1
Image document

CAPTCHA Suitable for Smartphones

Yusuke Tsuruta , Mayumi Takaya , Akihiro Yamamura
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.131-140, ⟨10.1007/978-3-642-36818-9_14⟩
Conference papers hal-01480158v1
Image document

Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme

Toan-Thinh Truong , Minh-Triet Tran , Anh-Duc Duong
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.409-415, ⟨10.1007/978-3-642-36818-9_45⟩
Conference papers hal-01480254v1
Image document

Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance

Amril Syalim , Takashi Nishide , Kouichi Sakurai
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.363-372, ⟨10.1007/978-3-642-36818-9_40⟩
Conference papers hal-01480195v1
Image document

Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?

Faisal Syafar , Jing Gao
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.173-182, ⟨10.1007/978-3-642-36818-9_18⟩
Conference papers hal-01480172v1
Image document

Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning

. Suprapto , Retantyo Wardoyo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.91-100, ⟨10.1007/978-3-642-36818-9_10⟩
Conference papers hal-01480222v1
Image document

Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique

Wayan Suparta , Kemal Maulana Alhasa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.214-222, ⟨10.1007/978-3-642-36818-9_22⟩
Conference papers hal-01480177v1
Image document

OSMF: A Framework for OSS Process Measurement

Wikan Danar Sunindyo , Fajar Juang Ekaputra
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.71-80, ⟨10.1007/978-3-642-36818-9_8⟩
Conference papers hal-01480215v1
Image document

A Test Case Generation Technique for VMM Fuzzing

Xiaoxia Sun , Hua Chen , Jinjing Zhao , Minhuan Huang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.318-323, ⟨10.1007/978-3-642-36818-9_34⟩
Conference papers hal-01480188v1
Image document

Software Development Methods in the Internet of Things

Selo Sulistyo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.50-59, ⟨10.1007/978-3-642-36818-9_6⟩
Conference papers hal-01480264v1
Image document

SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications

Masaya Shimakawa , Shigeki Hagihara , Naoki Yonezaki
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.60-70, ⟨10.1007/978-3-642-36818-9_7⟩
Conference papers hal-01480266v1
Image document

End-to-End Delay Performance for VoIP on LTE System in Access Network

Ng Liang Shen , Noraniah Abdul Aziz , Tutut Herawan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.162-172, ⟨10.1007/978-3-642-36818-9_17⟩
Conference papers hal-01480171v1
Image document

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors

Yuchao She , Hui Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers hal-01480185v1
Image document

Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution

Nungki Selviandro , Zainal Arifin Hasibuan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.192-201, ⟨10.1007/978-3-642-36818-9_20⟩
Conference papers hal-01480175v1
Image document

Code Based KPD Scheme with Full Connectivity: Deterministic Merging

Pinaki Sarkar , Aritra Dhar
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.141-151, ⟨10.1007/978-3-642-36818-9_15⟩
Conference papers hal-01480168v1
Image document

Indonesian Digital Natives

Neila Ramdhani , Wisnu Wiradhany
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.152-161, ⟨10.1007/978-3-642-36818-9_16⟩
Conference papers hal-01480170v1
Image document

A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud

Nguyen Quang-Hung , Pham Dac Nien , Nguyen Hoai Nam , Nguyen Huynh Tuong , Nam Thoai
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers hal-01480228v1
Image document

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs

Youngho Park , Chul Sur , Kyung-Hyune Rhee
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.416-425, ⟨10.1007/978-3-642-36818-9_46⟩
Conference papers hal-01480200v1
Image document

On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing

Ruxandra F. Olimid
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers hal-01480199v1
Image document

A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network

Thi Thao Nguyen , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.11-20, ⟨10.1007/978-3-642-36818-9_2⟩
Conference papers hal-01480235v1
Image document

On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries

Chan Nam Ngo , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers hal-01480224v1