Search - Information and Communication Technology Access content directly

Filter your results

63 results
Deposit type : Fulltext
Image document

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation

Huabiao Lu , Baokang Zhao , Xiaofeng Wang , Jinshu Su
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers hal-01480181v1
Image document

On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)

Bogdan Ksiezopolski , Damian Rusinek , Adam Wierzbicki
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.261-270, ⟨10.1007/978-3-642-36818-9_27⟩
Conference papers hal-01480233v1
Image document

A Recovery Approach for SQLite History Recorders from YAFFS2

Beibei Wu , Ming Xu , Haiping Zhang , Jian Xu , Yizhi Ren , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.295-299, ⟨10.1007/978-3-642-36818-9_30⟩
Conference papers hal-01480183v1
Image document

A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud

Nguyen Quang-Hung , Pham Dac Nien , Nguyen Hoai Nam , Nguyen Huynh Tuong , Nam Thoai
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers hal-01480228v1
Image document

Code Based KPD Scheme with Full Connectivity: Deterministic Merging

Pinaki Sarkar , Aritra Dhar
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.141-151, ⟨10.1007/978-3-642-36818-9_15⟩
Conference papers hal-01480168v1
Image document

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

Xingxing Xie , Hua Ma , Jin Li , Xiaofeng Chen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers hal-01480196v1
Image document

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Yinghui Zhang , Hui Li , Xiaoqing Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers hal-01480197v1
Image document

A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network

Thi Thao Nguyen , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.11-20, ⟨10.1007/978-3-642-36818-9_2⟩
Conference papers hal-01480235v1
Image document

Shifting Primes on OpenRISC Processors with Hardware Multiplier

Leandro Marin , Antonio J. Jara , Antonio Skarmeta
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.540-549, ⟨10.1007/978-3-642-36818-9_63⟩
Conference papers hal-01480261v1
Image document

Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution

Nungki Selviandro , Zainal Arifin Hasibuan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.192-201, ⟨10.1007/978-3-642-36818-9_20⟩
Conference papers hal-01480175v1
Image document

Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique

Wayan Suparta , Kemal Maulana Alhasa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.214-222, ⟨10.1007/978-3-642-36818-9_22⟩
Conference papers hal-01480177v1
Image document

Image Watermarking Using Psychovisual Threshold over the Edge

Nur Azman Abu , Ferda Ernawan , Nanna Suryana , Shahrin Sahib
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.519-527, ⟨10.1007/978-3-642-36818-9_60⟩
Conference papers hal-01480213v1
Image document

Semantic-Aware Obfuscation for Location Privacy at Database Level

Thu Bao Le , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers hal-01480225v1
Image document

A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet

Thach V. Bui , Oanh K. Nguyen , Van H. Dang , Nhung H. Nguyen , Thuc D. Nguyen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.324-330, ⟨10.1007/978-3-642-36818-9_35⟩
Conference papers hal-01480238v1
Image document

Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge

Sarbari Mitra , Sourav Mukhopadhyay , Ratna Dutta
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers hal-01480209v1
Image document

An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs

Huaqing Wen , Kyung-Hyune Rhee
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.502-506, ⟨10.1007/978-3-642-36818-9_57⟩
Conference papers hal-01480257v1
Image document

End-to-End Delay Performance for VoIP on LTE System in Access Network

Ng Liang Shen , Noraniah Abdul Aziz , Tutut Herawan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.162-172, ⟨10.1007/978-3-642-36818-9_17⟩
Conference papers hal-01480171v1
Image document

A Test Case Generation Technique for VMM Fuzzing

Xiaoxia Sun , Hua Chen , Jinjing Zhao , Minhuan Huang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.318-323, ⟨10.1007/978-3-642-36818-9_34⟩
Conference papers hal-01480188v1
Image document

Software Development Methods in the Internet of Things

Selo Sulistyo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.50-59, ⟨10.1007/978-3-642-36818-9_6⟩
Conference papers hal-01480264v1
Image document

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia

Fathul Wahid
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.1-10, ⟨10.1007/978-3-642-36818-9_1⟩
Conference papers hal-01480174v1
Image document

Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks

Jostein Jensen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.343-352, ⟨10.1007/978-3-642-36818-9_38⟩
Conference papers hal-01480241v1
Image document

A Data Structure for Efficient Biometric Identification

Kensuke Baba , Serina Egawa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.528-533, ⟨10.1007/978-3-642-36818-9_61⟩
Conference papers hal-01480259v1
Image document

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter

Dongjin Choi , Ilsun You , Pankoo Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers hal-01480180v1
Image document

SA4WSs: A Security Architecture for Web Services

Lingxia Liu , Dongxia Wang , Jinjing Zhao , Minhuan Huang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, ⟨10.1007/978-3-642-36818-9_32⟩
Conference papers hal-01480186v1
Image document

Early-Detection System for Cross-Language (Translated) Plagiarism

Khabib Mustofa , Yosua Albert Sir
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.21-30, ⟨10.1007/978-3-642-36818-9_3⟩
Conference papers hal-01480193v1
Image document

A Block Cipher Mode of Operation with Two Keys

Yi-Li Huang , Fang-Yie Leu , Jung-Chun Liu , Jing-Hao Yang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.392-398, ⟨10.1007/978-3-642-36818-9_43⟩
Conference papers hal-01480198v1
Image document

Emulation on the Internet Prefix Hijacking Attack Impaction

Jinjing Zhao , Yan Wen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers hal-01480207v1
Image document

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction

Lu Zhao , Ho-Seok Kang , Sung-Ryul Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers hal-01480208v1
Image document

A Data-Driven Approach toward Building Dynamic Ontology

Dhomas Hatta Fudholi , Wenny Rahayu , Eric Pardede , . Hendrik
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.223-232, ⟨10.1007/978-3-642-36818-9_23⟩
Conference papers hal-01480229v1
Image document

A Proposal on Security Case Based on Common Criteria

Shuichiro Yamamoto , Tomoko Kaneko , Hidehiko Tanaka
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers hal-01480190v1