Information and Communication Technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings - Khabib Mustofa

Information and Communication Technology

International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings

By: Khabib Mustofa (Editor), Erich Neuhold (Editor), A Min Tjoa (Editor)

Paperback | 20 February 2013

At a Glance

Paperback


$101.07

or 4 interest-free payments of $25.27 with

 or 

Aims to ship in 7 to 10 business days

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework.- Software Development Methods in the Internet of Things.- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distr

More in Ethical & Social Aspects of IT

Doppelganger : A Trip Into the Mirror World - Naomi Klein
Man-Made : How the bias of the past is being built into the future - Tracey Spicer
Hackers & Painters - Paul Graham

RRP $38.00

$23.75

37%
OFF
Blockchain : Blueprint for a New Economy - Melanie Swan

RRP $66.50

$32.75

51%
OFF
I'm a Romance Scam IT Detective (Edition 2) - Selina Co
Digital Identity : O'Reilly Ser. - Phil Windley

RRP $53.25

$27.75

48%
OFF
Security and Usability : O'Reilly Ser. - Lorrie Faith Cranor

RRP $76.00

$35.75

53%
OFF
Beautiful Security : O'Reilly Ser. - Andy Oram

RRP $60.80

$29.25

52%
OFF
Social Media Strategy : Tools for Professionals and Organizations - Phillip G. Clampitt