ICT-EurAsia 2013: Yogyakarta, Indonesia
Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings
Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You
Springer, Lecture Notes in Computer Science 7804, ISBN: 978-3-642-36817-2
Contents
Information and Communication Technology- Eurasia Conference (ICT-EurAsia)
Ai Thao Nguyen Thi, Tran Khanh Dang
11-20
Early-Detection System for Cross-Language (Translated) Plagiarism.
Khabib Mustofa, Yosua Albert Sir
21-30
Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra
41-49
SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.
Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki
60-70
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.
Suprapto, Retantyo Wardoyo
91-100
Chan Nam Ngo, Tran Khanh Dang
101-110
Semantic-Aware Obfuscation for Location Privacy at Database Level.
Thu Le Thi Bao, Tran Khanh Dang
111-120
Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang
121-130
Code Based KPD Scheme with Full Connectivity: Deterministic Merging.
Pinaki Sarkar, Aritra Dhar
141-151
Indonesian Digital Natives - ICT Usage Pattern Study across Different Age Groups.
Neila Ramdhani, Wisnu Wiradhany
152-161
End-to-End Delay Performance for VoIP on LTE System in Access Network.
Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan
162-172
Faisal Syafar, Jing Gao
173-182
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.
Nguyen Quang-Hung, Pham Dac Nien, Nguyen Hoai Nam, Nguyen Huynh Tuong, Nam Thoai
183-191
Nungki Selviandro, Zainal A. Hasibuan
192-201
Information Systems Strategic Planning for a Naval Hospital.
Hery Harjono Muljo, Bens Pardamean
202-213
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.
Wayan Suparta, Kemal Maulana Alhasa
214-222
A Data-Driven Approach toward Building Dynamic Ontology.
Dhomas Hatta Fudholi, Wenny Rahayu, Eric Pardede, Hendrik
223-232
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.
Muhammad Asfand-e-yar, A Min Tjoa
233-242
Asian Conference on Availability, Reliability and Security (AsiaARES)
Secure and Verifiable Outsourcing of Sequence Comparisons.
Yansheng Feng, Hua Ma, Xiaofeng Chen 0001, Hui Zhu
243-252
Dongjin Choi, Ilsun You, PanKoo Kim
253-260
Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki
261-270
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su
271-284
A Recovery Approach for SQLite History Recorders from YAFFS2.
Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng
295-299
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.
Yuchao She, Hui Li, Hui Zhu
300-305
SA4WSs: A Security Architecture for Web Services.
Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang
306-311
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu
312-317
A Test Case Generation Technique for VMM Fuzzing.
Xiao Xia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang
318-323
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.
Thach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc Dinh Nguyen
324-330
A Proposal on Security Case Based on Common Criteria.
Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka
331-336
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.
Wentao Jia, Rui Li, Chunyuan Zhang
337-342
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.
Jostein Jensen
343-352
Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.
Amril Syalim, Takashi Nishide, Kouichi Sakurai
363-372
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.
Xingxing Xie 0001, Hua Ma, Jin Li 0002, Xiaofeng Chen 0001
373-382
Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu
383-391
A Block Cipher Mode of Operation with Two Keys.
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang
392-398
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.
Ruxandra F. Olimid
399-408
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.
Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong
409-415
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.
Youngho Park, Chul Sur, Kyung Hyune Rhee
416-425
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.
Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez
426-440
Nisreen Alam Aldeen, Gerald Quirchmayr
441-446
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.
Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani
447-452
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.
Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You
453-458
CSP-Based General Detection Model of Network Covert Storage Channels.
Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li
459-468
Trustworthy Opportunistic Access to the Internet of Services.
Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You
469-478
Architecture of Network Environment for High-Risk Security Experimentation.
Xiaohui Kuang, Xiang Li, Jinjing Zhao
479-484
Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim
490-495
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.
Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta
496-501
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.
Huaqing Wen, Kyung-Hyune Rhee
502-506
A Review of Security Attacks on the GSM Standard.
Giuseppe Cattaneo, Giancarlo De Maio, Pompeo Faruolo, Umberto Ferraro Petrillo
507-512
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.
Huan Wang, Mingxing He, Xiao Li
513-518
Image Watermarking Using Psychovisual Threshold over the Edge.
Nur Azman Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib
519-527
Hae-Min Moon, Sung Bum Pan
534-539
Shifting Primes on OpenRISC Processors with Hardware Multiplier.
Leandro Marin, Antonio J. Jara, Antonio F. Gómez-Skarmeta
540-549