IFIP TC6 Open Digital Library

ICT-EurAsia 2013: Yogyakarta, Indonesia

Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings

Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You

Springer, Lecture Notes in Computer Science 7804, ISBN: 978-3-642-36817-2



Contents

Information and Communication Technology- Eurasia Conference (ICT-EurAsia)

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.

Fathul Wahid

 1-10

A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.

Ai Thao Nguyen Thi, Tran Khanh Dang

 11-20

Early-Detection System for Cross-Language (Translated) Plagiarism.

Khabib Mustofa, Yosua Albert Sir

 21-30

TransWiki: Supporting Translation Teaching.

Robert P. Biuk-Aghai, Hari Venkatesan

 31-40

Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework.

Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra

 41-49

Software Development Methods in the Internet of Things.

Selo Sulistyo

 50-59

SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.

Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki

 60-70

OSMF: A Framework for OSS Process Measurement.

Wikan Danar Sunindyo, Fajar Juang Ekaputra

 71-80

Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.

Susmit Bagchi

 81-90

Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.

Suprapto, Retantyo Wardoyo

 91-100

On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.

Chan Nam Ngo, Tran Khanh Dang

 101-110

Semantic-Aware Obfuscation for Location Privacy at Database Level.

Thu Le Thi Bao, Tran Khanh Dang

 111-120

Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.

Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang

 121-130

CAPTCHA Suitable for Smartphones.

Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura

 131-140

Code Based KPD Scheme with Full Connectivity: Deterministic Merging.

Pinaki Sarkar, Aritra Dhar

 141-151

Indonesian Digital Natives - ICT Usage Pattern Study across Different Age Groups.

Neila Ramdhani, Wisnu Wiradhany

 152-161

End-to-End Delay Performance for VoIP on LTE System in Access Network.

Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan

 162-172

Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required?

Faisal Syafar, Jing Gao

 173-182

A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.

Nguyen Quang-Hung, Pham Dac Nien, Nguyen Hoai Nam, Nguyen Huynh Tuong, Nam Thoai

 183-191

Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.

Nungki Selviandro, Zainal A. Hasibuan

 192-201

Information Systems Strategic Planning for a Naval Hospital.

Hery Harjono Muljo, Bens Pardamean

 202-213

Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.

Wayan Suparta, Kemal Maulana Alhasa

 214-222

A Data-Driven Approach toward Building Dynamic Ontology.

Dhomas Hatta Fudholi, Wenny Rahayu, Eric Pardede, Hendrik

 223-232

Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.

Muhammad Asfand-e-yar, A Min Tjoa

 233-242

Asian Conference on Availability, Reliability and Security (AsiaARES)

Secure and Verifiable Outsourcing of Sequence Comparisons.

Yansheng Feng, Hua Ma, Xiaofeng Chen 0001, Hui Zhu

 243-252

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.

Dongjin Choi, Ilsun You, PanKoo Kim

 253-260

On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).

Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki

 261-270

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.

Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su

 271-284

On Identifying Proper Security Mechanisms.

Jakub Breier, Ladislav Hudec

 285-294

A Recovery Approach for SQLite History Recorders from YAFFS2.

Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng

 295-299

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.

Yuchao She, Hui Li, Hui Zhu

 300-305

SA4WSs: A Security Architecture for Web Services.

Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang

 306-311

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.

Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu

 312-317

A Test Case Generation Technique for VMM Fuzzing.

Xiao Xia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang

 318-323

A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.

Thach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc Dinh Nguyen

 324-330

A Proposal on Security Case Based on Common Criteria.

Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka

 331-336

An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.

Wentao Jia, Rui Li, Chunyuan Zhang

 337-342

Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.

Jostein Jensen

 343-352

Anonymous Lattice-Based Broadcast Encryption.

Adela Georgescu

 353-362

Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.

Amril Syalim, Takashi Nishide, Kouichi Sakurai

 363-372

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.

Xingxing Xie 0001, Hua Ma, Jin Li 0002, Xiaofeng Chen 0001

 373-382

Provably Secure and Subliminal-Free Variant of Schnorr Signature.

Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu

 383-391

A Block Cipher Mode of Operation with Two Keys.

Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang

 392-398

On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.

Ruxandra F. Olimid

 399-408

Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.

Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong

 409-415

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.

Youngho Park, Chul Sur, Kyung Hyune Rhee

 416-425

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.

Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez

 426-440

Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.

Nisreen Alam Aldeen, Gerald Quirchmayr

 441-446

Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.

Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani

 447-452

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.

Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You

 453-458

CSP-Based General Detection Model of Network Covert Storage Channels.

Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li

 459-468

Trustworthy Opportunistic Access to the Internet of Services.

Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You

 469-478

Architecture of Network Environment for High-Risk Security Experimentation.

Xiaohui Kuang, Xiang Li, Jinjing Zhao

 479-484

Emulation on the Internet Prefix Hijacking Attack Impaction.

Jinjing Zhao, Yan Wen

 485-489

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.

Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim

 490-495

Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.

Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta

 496-501

An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.

Huaqing Wen, Kyung-Hyune Rhee

 502-506

A Review of Security Attacks on the GSM Standard.

Giuseppe Cattaneo, Giancarlo De Maio, Pompeo Faruolo, Umberto Ferraro Petrillo

 507-512

An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.

Huan Wang, Mingxing He, Xiao Li

 513-518

Image Watermarking Using Psychovisual Threshold over the Edge.

Nur Azman Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib

 519-527

A Data Structure for Efficient Biometric Identification.

Kensuke Baba, Serina Egawa

 528-533

The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.

Hae-Min Moon, Sung Bum Pan

 534-539

Shifting Primes on OpenRISC Processors with Hardware Multiplier.

Leandro Marin, Antonio J. Jara, Antonio F. Gómez-Skarmeta

 540-549