Online Library TheLib.net » Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings
cover of the book Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings

Ebook: Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings

00
27.01.2024
0
0

This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.




This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.


This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
Content:
Front Matter....Pages -
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia....Pages 1-10
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network....Pages 11-20
Early-Detection System for Cross-Language (Translated) Plagiarism....Pages 21-30
TransWiki: Supporting Translation Teaching....Pages 31-40
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework....Pages 41-49
Software Development Methods in the Internet of Things....Pages 50-59
SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications....Pages 60-70
OSMF: A Framework for OSS Process Measurement....Pages 71-80
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs....Pages 81-90
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning....Pages 91-100
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries....Pages 101-110
Semantic-Aware Obfuscation for Location Privacy at Database Level....Pages 111-120
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch....Pages 121-130
CAPTCHA Suitable for Smartphones....Pages 131-140
Code Based KPD Scheme with Full Connectivity: Deterministic Merging....Pages 141-151
Indonesian Digital Natives....Pages 152-161
End-to-End Delay Performance for VoIP on LTE System in Access Network....Pages 162-172
Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?....Pages 173-182
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud....Pages 183-191
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution....Pages 192-201
Information Systems Strategic Planning for a Naval Hospital....Pages 202-213
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique....Pages 214-222
A Data-Driven Approach toward Building Dynamic Ontology....Pages 223-232
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement....Pages 233-242
Secure and Verifiable Outsourcing of Sequence Comparisons....Pages 243-252
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter....Pages 253-260
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)....Pages 261-270
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation....Pages 271-284
On Identifying Proper Security Mechanisms....Pages 285-294
A Recovery Approach for SQLite History Recorders from YAFFS2....Pages 295-299
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors....Pages 300-305
SA4WSs: A Security Architecture for Web Services....Pages 306-311
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation....Pages 312-317
A Test Case Generation Technique for VMM Fuzzing....Pages 318-323
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet....Pages 324-330
A Proposal on Security Case Based on Common Criteria....Pages 331-336
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors....Pages 337-342
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks....Pages 343-352
Anonymous Lattice-Based Broadcast Encryption....Pages 353-362
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance....Pages 363-372
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation....Pages 373-382
Provably Secure and Subliminal-Free Variant of Schnorr Signature....Pages 383-391
A Block Cipher Mode of Operation with Two Keys....Pages 392-398
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing....Pages 399-408
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme....Pages 409-415
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs....Pages 416-425
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data....Pages 426-440
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control....Pages 441-446
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol....Pages 447-452
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution....Pages 453-458
CSP-Based General Detection Model of Network Covert Storage Channels....Pages 459-468
Trustworthy Opportunistic Access to the Internet of Services....Pages 469-478
Architecture of Network Environment for High-Risk Security Experimentation....Pages 479-484
Emulation on the Internet Prefix Hijacking Attack Impaction....Pages 485-489
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction....Pages 490-495
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge....Pages 496-501
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs....Pages 502-506
A Review of Security Attacks on the GSM Standard....Pages 507-512
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation....Pages 513-518
Image Watermarking Using Psychovisual Threshold over the Edge....Pages 519-527
A Data Structure for Efficient Biometric Identification....Pages 528-533
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System....Pages 534-539
Shifting Primes on OpenRISC Processors with Hardware Multiplier....Pages 540-549
Back Matter....Pages -


This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013.
The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
Content:
Front Matter....Pages -
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia....Pages 1-10
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network....Pages 11-20
Early-Detection System for Cross-Language (Translated) Plagiarism....Pages 21-30
TransWiki: Supporting Translation Teaching....Pages 31-40
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework....Pages 41-49
Software Development Methods in the Internet of Things....Pages 50-59
SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications....Pages 60-70
OSMF: A Framework for OSS Process Measurement....Pages 71-80
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs....Pages 81-90
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning....Pages 91-100
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries....Pages 101-110
Semantic-Aware Obfuscation for Location Privacy at Database Level....Pages 111-120
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch....Pages 121-130
CAPTCHA Suitable for Smartphones....Pages 131-140
Code Based KPD Scheme with Full Connectivity: Deterministic Merging....Pages 141-151
Indonesian Digital Natives....Pages 152-161
End-to-End Delay Performance for VoIP on LTE System in Access Network....Pages 162-172
Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?....Pages 173-182
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud....Pages 183-191
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution....Pages 192-201
Information Systems Strategic Planning for a Naval Hospital....Pages 202-213
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique....Pages 214-222
A Data-Driven Approach toward Building Dynamic Ontology....Pages 223-232
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement....Pages 233-242
Secure and Verifiable Outsourcing of Sequence Comparisons....Pages 243-252
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter....Pages 253-260
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)....Pages 261-270
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation....Pages 271-284
On Identifying Proper Security Mechanisms....Pages 285-294
A Recovery Approach for SQLite History Recorders from YAFFS2....Pages 295-299
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors....Pages 300-305
SA4WSs: A Security Architecture for Web Services....Pages 306-311
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation....Pages 312-317
A Test Case Generation Technique for VMM Fuzzing....Pages 318-323
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet....Pages 324-330
A Proposal on Security Case Based on Common Criteria....Pages 331-336
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors....Pages 337-342
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks....Pages 343-352
Anonymous Lattice-Based Broadcast Encryption....Pages 353-362
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance....Pages 363-372
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation....Pages 373-382
Provably Secure and Subliminal-Free Variant of Schnorr Signature....Pages 383-391
A Block Cipher Mode of Operation with Two Keys....Pages 392-398
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing....Pages 399-408
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme....Pages 409-415
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs....Pages 416-425
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data....Pages 426-440
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control....Pages 441-446
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol....Pages 447-452
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution....Pages 453-458
CSP-Based General Detection Model of Network Covert Storage Channels....Pages 459-468
Trustworthy Opportunistic Access to the Internet of Services....Pages 469-478
Architecture of Network Environment for High-Risk Security Experimentation....Pages 479-484
Emulation on the Internet Prefix Hijacking Attack Impaction....Pages 485-489
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction....Pages 490-495
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge....Pages 496-501
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs....Pages 502-506
A Review of Security Attacks on the GSM Standard....Pages 507-512
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation....Pages 513-518
Image Watermarking Using Psychovisual Threshold over the Edge....Pages 519-527
A Data Structure for Efficient Biometric Identification....Pages 528-533
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System....Pages 534-539
Shifting Primes on OpenRISC Processors with Hardware Multiplier....Pages 540-549
Back Matter....Pages -
....
Download the book Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen