LEADER 14378nam 22008535 450 001 9910485023903321 005 20200703221058.0 010 $a3-642-36818-2 024 7 $a10.1007/978-3-642-36818-9 035 $a(CKB)3280000000007558 035 $a(SSID)ssj0000880015 035 $a(PQKBManifestationID)11546665 035 $a(PQKBTitleCode)TC0000880015 035 $a(PQKBWorkID)10873211 035 $a(PQKB)10690855 035 $a(DE-He213)978-3-642-36818-9 035 $a(MiAaPQ)EBC3093595 035 $a(PPN)169139670 035 $a(EXLCZ)993280000000007558 100 $a20130305d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation and Communication Technology $eInternational Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings /$fedited by Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XVI, 552 p. 170 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v7804 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-36817-4 320 $aIncludes bibliographical references and author index. 327 $aTranslating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians? Adoption of Electronic Medical Records: Model Development Using Ability ? Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT?Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance ? What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping ?Provenance? of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians? Adoption of Electronic Medical Records: Model Development Using Ability ? Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT?Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance ? What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping ?Provenance? of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting P. 330 $aThis book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v7804 606 $aComputers and civilization 606 $aComputer security 606 $aInformation storage and retrieval 606 $aApplication software 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 608 $aConference proceedings.$2fast 615 0$aComputers and civilization. 615 0$aComputer security. 615 0$aInformation storage and retrieval. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 14$aComputers and Society. 615 24$aSystems and Data Security. 615 24$aInformation Storage and Retrieval. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aComputer Communication Networks. 676 $a004.6 702 $aMustofa$b Khabib$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNeuhold$b Erich$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTjoa$b A Min$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWeippl$b Edgar R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYou$b Ilsun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485023903321 996 $aInformation and communication technology$91100160 997 $aUNINA