Filter your results
- 185
- 185
- 185
- 744
- 1
- 1
- 185
- 185
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Cloud-Based Privacy Aware Preference Aggregation Service1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.208-223
Conference papers
hal-01506784v1
|
||
|
Active Learning Enhanced Document Annotation for Sentiment Analysis1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.345-353
Conference papers
hal-01506776v1
|
||
|
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers
hal-01480180v1
|
||
|
SA4WSs: A Security Architecture for Web Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, ⟨10.1007/978-3-642-36818-9_32⟩
Conference papers
hal-01480186v1
|
||
|
Early-Detection System for Cross-Language (Translated) Plagiarism1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.21-30, ⟨10.1007/978-3-642-36818-9_3⟩
Conference papers
hal-01480193v1
|
||
|
A Block Cipher Mode of Operation with Two Keys1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.392-398, ⟨10.1007/978-3-642-36818-9_43⟩
Conference papers
hal-01480198v1
|
||
|
Emulation on the Internet Prefix Hijacking Attack Impaction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers
hal-01480207v1
|
||
|
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers
hal-01480208v1
|
||
|
A Data-Driven Approach toward Building Dynamic Ontology1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.223-232, ⟨10.1007/978-3-642-36818-9_23⟩
Conference papers
hal-01480229v1
|
||
|
A Proposal on Security Case Based on Common Criteria1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers
hal-01480190v1
|
||
|
On Interactive Data Visualization of Physiological Low-Cost-Sensor Data with Focus on Mental Stress1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.469-480
Conference papers
hal-01506791v1
|
||
|
A Fully Reversible Data Transform Technique Enhancing Data Compression of SMILES Data1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.54-68
Conference papers
hal-01506777v1
|
||
|
How to Support (Political) Decisions? Presentation of a Micro-simulation Model to Assess the Implications of EU-wide Tax Reforms12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.111-122, ⟨10.1007/978-3-642-40358-3_10⟩
Conference papers
hal-01490899v1
|
||
|
Eye Location and Eye State Detection in Facial Images Using Circular Hough Transform12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.141-147, ⟨10.1007/978-3-642-40925-7_14⟩
Conference papers
hal-01496060v1
|
||
|
The Removal of False Detections from Foreground Regions Extracted Using Adaptive Background Modelling for a Visual Surveillance System12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.253-264, ⟨10.1007/978-3-642-40925-7_24⟩
Conference papers
hal-01496072v1
|
||
|
Modified Moment Method Estimator for the Shape Parameter of Generalized Gaussian Distribution for a Small Sample Size12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.420-429, ⟨10.1007/978-3-642-40925-7_39⟩
Conference papers
hal-01496087v1
|
||
|
Stakeholder Salience Changes in an e-Government Implementation Project12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.237-249, ⟨10.1007/978-3-642-40358-3_20⟩
Conference papers
hal-01490970v1
|
||
|
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers
hal-01480199v1
|
||
|
Intelligent UBMSS Systems for Strategic Information Management1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers
hal-01506573v1
|
||
|
CAPTCHA Suitable for Smartphones1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.131-140, ⟨10.1007/978-3-642-36818-9_14⟩
Conference papers
hal-01480158v1
|
||
|
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers
hal-01480185v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|
||
|
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers
hal-01480202v1
|
||
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers
hal-01506705v1
|
||
|
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers
hal-01480196v1
|
||
|
Provably Secure and Subliminal-Free Variant of Schnorr Signature1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers
hal-01480197v1
|
||
|
MetaExtractor: A System for Metadata Extraction from Structured Data Sources1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.84-99
Conference papers
hal-01506797v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Identification of Persons by Virtue of Hand Geometry12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers
hal-01496097v1
|
||
|
GPRS Security for Smart Meters1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.195-207
Conference papers
hal-01506796v1
|