IFIP TC6 Open Digital Library

ICT-EurAsia 2013: Yogyakarta, Indonesia

Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings

Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You

Springer, Lecture Notes in Computer Science 7804, ISBN: 978-3-642-36817-2


Information and Communication Technology- Eurasia Conference (ICT-EurAsia)

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.

Fathul Wahid


A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.

Ai Thao Nguyen Thi, Tran Khanh Dang


Early-Detection System for Cross-Language (Translated) Plagiarism.

Khabib Mustofa, Yosua Albert Sir


TransWiki: Supporting Translation Teaching.

Robert P. Biuk-Aghai, Hari Venkatesan


Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework.

Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra


Software Development Methods in the Internet of Things.

Selo Sulistyo


SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.

Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki


OSMF: A Framework for OSS Process Measurement.

Wikan Danar Sunindyo, Fajar Juang Ekaputra


Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.

Susmit Bagchi


Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.

Suprapto, Retantyo Wardoyo


On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.

Chan Nam Ngo, Tran Khanh Dang


Semantic-Aware Obfuscation for Location Privacy at Database Level.

Thu Le Thi Bao, Tran Khanh Dang


Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.

Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang


CAPTCHA Suitable for Smartphones.

Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura


Code Based KPD Scheme with Full Connectivity: Deterministic Merging.

Pinaki Sarkar, Aritra Dhar


Indonesian Digital Natives - ICT Usage Pattern Study across Different Age Groups.

Neila Ramdhani, Wisnu Wiradhany


End-to-End Delay Performance for VoIP on LTE System in Access Network.

Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan


Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required?

Faisal Syafar, Jing Gao


A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.

Nguyen Quang-Hung, Pham Dac Nien, Nguyen Hoai Nam, Nguyen Huynh Tuong, Nam Thoai


Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.

Nungki Selviandro, Zainal A. Hasibuan


Information Systems Strategic Planning for a Naval Hospital.

Hery Harjono Muljo, Bens Pardamean


Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.

Wayan Suparta, Kemal Maulana Alhasa


A Data-Driven Approach toward Building Dynamic Ontology.

Dhomas Hatta Fudholi, Wenny Rahayu, Eric Pardede, Hendrik


Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.

Muhammad Asfand-e-yar, A Min Tjoa


Asian Conference on Availability, Reliability and Security (AsiaARES)

Secure and Verifiable Outsourcing of Sequence Comparisons.

Yansheng Feng, Hua Ma, Xiaofeng Chen 0001, Hui Zhu


Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.

Dongjin Choi, Ilsun You, PanKoo Kim


On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).

Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki


DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.

Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su


On Identifying Proper Security Mechanisms.

Jakub Breier, Ladislav Hudec


A Recovery Approach for SQLite History Recorders from YAFFS2.

Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng


UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.

Yuchao She, Hui Li, Hui Zhu


SA4WSs: A Security Architecture for Web Services.

Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang


Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.

Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu


A Test Case Generation Technique for VMM Fuzzing.

Xiao Xia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang


A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.

Thach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc Dinh Nguyen


A Proposal on Security Case Based on Common Criteria.

Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka


An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.

Wentao Jia, Rui Li, Chunyuan Zhang


Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.

Jostein Jensen


Anonymous Lattice-Based Broadcast Encryption.

Adela Georgescu


Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.

Amril Syalim, Takashi Nishide, Kouichi Sakurai


New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.

Xingxing Xie 0001, Hua Ma, Jin Li 0002, Xiaofeng Chen 0001


Provably Secure and Subliminal-Free Variant of Schnorr Signature.

Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu


A Block Cipher Mode of Operation with Two Keys.

Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang


On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.

Ruxandra F. Olimid


Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.

Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong


A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.

Youngho Park, Chul Sur, Kyung Hyune Rhee


Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.

Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez


Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.

Nisreen Alam Aldeen, Gerald Quirchmayr


Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.

Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani


A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.

Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You


CSP-Based General Detection Model of Network Covert Storage Channels.

Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li


Trustworthy Opportunistic Access to the Internet of Services.

Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You


Architecture of Network Environment for High-Risk Security Experimentation.

Xiaohui Kuang, Xiang Li, Jinjing Zhao


Emulation on the Internet Prefix Hijacking Attack Impaction.

Jinjing Zhao, Yan Wen


Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.

Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim


Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.

Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta


An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.

Huaqing Wen, Kyung-Hyune Rhee


A Review of Security Attacks on the GSM Standard.

Giuseppe Cattaneo, Giancarlo De Maio, Pompeo Faruolo, Umberto Ferraro Petrillo


An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.

Huan Wang, Mingxing He, Xiao Li


Image Watermarking Using Psychovisual Threshold over the Edge.

Nur Azman Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib


A Data Structure for Efficient Biometric Identification.

Kensuke Baba, Serina Egawa


The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.

Hae-Min Moon, Sung Bum Pan


Shifting Primes on OpenRISC Processors with Hardware Multiplier.

Leandro Marin, Antonio J. Jara, Antonio F. Gómez-Skarmeta