Filter your results
- 62
- 1
- 62
- 1
- 63
- 53
- 63
- 63
- 1
- 4
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.60-70, ⟨10.1007/978-3-642-36818-9_7⟩
Conference papers
hal-01480266v1
|
||
|
Software Development Methods in the Internet of Things1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.50-59, ⟨10.1007/978-3-642-36818-9_6⟩
Conference papers
hal-01480264v1
|
||
|
Shifting Primes on OpenRISC Processors with Hardware Multiplier1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.540-549, ⟨10.1007/978-3-642-36818-9_63⟩
Conference papers
hal-01480261v1
|
||
|
A Data Structure for Efficient Biometric Identification1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.528-533, ⟨10.1007/978-3-642-36818-9_61⟩
Conference papers
hal-01480259v1
|
||
|
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.502-506, ⟨10.1007/978-3-642-36818-9_57⟩
Conference papers
hal-01480257v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|
||
|
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.409-415, ⟨10.1007/978-3-642-36818-9_45⟩
Conference papers
hal-01480254v1
|
||
|
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.343-352, ⟨10.1007/978-3-642-36818-9_38⟩
Conference papers
hal-01480241v1
|
||
|
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.324-330, ⟨10.1007/978-3-642-36818-9_35⟩
Conference papers
hal-01480238v1
|
||
|
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.11-20, ⟨10.1007/978-3-642-36818-9_2⟩
Conference papers
hal-01480235v1
|
||
|
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.261-270, ⟨10.1007/978-3-642-36818-9_27⟩
Conference papers
hal-01480233v1
|
||
|
A Data-Driven Approach toward Building Dynamic Ontology1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.223-232, ⟨10.1007/978-3-642-36818-9_23⟩
Conference papers
hal-01480229v1
|
||
|
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers
hal-01480228v1
|
||
|
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.121-130, ⟨10.1007/978-3-642-36818-9_13⟩
Conference papers
hal-01480226v1
|
||
|
Semantic-Aware Obfuscation for Location Privacy at Database Level1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers
hal-01480225v1
|
||
|
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers
hal-01480224v1
|
||
|
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.91-100, ⟨10.1007/978-3-642-36818-9_10⟩
Conference papers
hal-01480222v1
|
||
|
Information and Communication TechnologySpringer, LNCS-7804, 2013, Lecture Notes in Computer Science, 978-3-642-36817-2. ⟨10.1007/978-3-642-36818-9⟩
Books
hal-01480217v1
|
||
|
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.81-90, ⟨10.1007/978-3-642-36818-9_9⟩
Conference papers
hal-01480216v1
|
||
|
OSMF: A Framework for OSS Process Measurement1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.71-80, ⟨10.1007/978-3-642-36818-9_8⟩
Conference papers
hal-01480215v1
|
||
|
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.534-539, ⟨10.1007/978-3-642-36818-9_62⟩
Conference papers
hal-01480214v1
|
||
|
Image Watermarking Using Psychovisual Threshold over the Edge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.519-527, ⟨10.1007/978-3-642-36818-9_60⟩
Conference papers
hal-01480213v1
|
||
|
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.41-49, ⟨10.1007/978-3-642-36818-9_5⟩
Conference papers
hal-01480212v1
|
||
|
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.513-518, ⟨10.1007/978-3-642-36818-9_59⟩
Conference papers
hal-01480211v1
|
||
|
A Review of Security Attacks on the GSM Standard1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.507-512, ⟨10.1007/978-3-642-36818-9_58⟩
Conference papers
hal-01480210v1
|
||
|
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers
hal-01480209v1
|
||
|
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers
hal-01480208v1
|
||
|
Emulation on the Internet Prefix Hijacking Attack Impaction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers
hal-01480207v1
|
||
|
Architecture of Network Environment for High-Risk Security Experimentation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.479-484, ⟨10.1007/978-3-642-36818-9_53⟩
Conference papers
hal-01480206v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|