![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
ICETE 2010: Athens, Greece
- Mohammad S. Obaidat, George A. Tsihrintzis, Joaquim Filipe
:
e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers. Communications in Computer and Information Science 222, Springer 2012, ISBN 978-3-642-25205-1
Invited Paper
- David A. Marca, Rebecca Bulander, Cornelia Kruslin, Boris Shishkov, Marten van Sinderen:
e-Business Challenges and Directions: Important Themes from the First ICE-B Workshop. 3-35
Part I: Data Communication Networking (DCNET)
- Miroslav Svéda, Ondrej Rysavý, Gayan de Silva, Petr Matousek
, Jaroslav Ráb:
Static Analysis of Routing and Firewall Policy Configurations. 39-53 - Bayrem Triki
, Slim Rekhis
, Noureddine Boudriga:
Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks. 54-70 - Manuel Koschuch
, Matthias Hudler, Michael Krüger:
The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA. 71-83 - Mario A. Gomez-Rodriguez
, Víctor Jesús Sosa Sosa, Ivan López-Arévalo:
Mobile Applications Middleware for File Swapping. 84-94
Part II: e-Business (ICE-B)
- Andreas Holzinger
, Martin Schlögl, Bernhard Peischl
, Matjaz Debevc:
Optimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information System on the Basis of Real-Life Usability Research. 97-111 - Andreas Geyer-Schulz, Michael Ovelgönne, Andreas C. Sonnenbichler:
A Social Location-Based Emergency Service to Eliminate the Bystander Effect. 112-130
Part III: Optical Communication Systems (OPTICS)
- Iñigo Artundo
, David García-Roger
, Beatriz Ortega
:
Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality Environments. 133-144
Part IV: Security and Cryptography (SECRYPT)
- Alex Biryukov
, Deike Priemuth-Schmid, Bin Zhang:
Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕. 147-157 - John A. Clark, Juan E. Tapiador
, John A. McDermid
, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Modelling Uncertain and Time-Dependent Security Labels in MLS Systems. 158-171 - Keith B. Frikken, Yihua Zhang:
Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity. 172-187 - Yuto Nakano, Jun Kurihara
, Shinsaku Kiyomoto, Toshiaki Tanaka:
Stream Cipher-Based Hash Function and Its Security. 188-202 - María Isabel González Vasco
, Somayeh Heidarvand, Jorge L. Villar
:
Flexible Anonymous Subscription Schemes. 203-219 - Mebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta:
Proxiable Designated Verifier Signature. 220-232 - Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-Commitment Protocols. 233-242 - Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante:
Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes. 243-258 - Swarun Kumar
, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan:
Threshold Discernible Ring Signatures. 259-273 - Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. 274-288 - Daniel Slamanig
, Stefan Rass
:
Selectively Traceable Anonymous and Unlinkable Token-Based Transactions. 289-303 - Luan Ibraimi, Muhammad Asim, Milan Petkovic:
An Encryption Scheme for a Secure Policy Updating. 304-318 - Alex Hai Wang:
Machine Learning for the Detection of Spam in Twitter Networks. 319-333
Part V: Signal Processing and Multimedia Applications (SIGMAP)
- Hisato Aota, Kazuhiro Ota, Yuichi Yaguchi, Ryuichi Oka:
Deformable Multi-object Tracking Using Full Pixel Matching of Image. 337-349 - Tanya Le Sage, Axel Bindel, Paul P. Conway
, Laura Justham
, Siân Slawson, James Webster, Andrew A. West:
A Multi-sensor System for Monitoring the Performance of Elite Swimmers. 350-362 - Trevor Spiteri, Victor Buttigieg:
Maximum a Posteriori Decoding of Arithmetic Codes in Joint Source-Channel Coding. 363-377 - Bálint Antal
, István Lázár, András Hajdu
:
An Ensemble Approach to Improve Microaneurysm Candidate Extraction. 378-391
Part VI: Wireless Information Networks and Systems (WINSYS)
- Andreas Ahrens
, César Benavente-Peces
:
Modulation-Mode Assignment for SVD-Aided and BICM-Assisted Downlink Multiuser MIMO Transmission Schemes. 395-409 - Iñigo Cuiñas, Manuel García Sánchez
:
Evaluation of the Performance of Polarization Diversity Estimated from Measurements at One Polarization. 410-423 - Nikolaos Triantafyllou, Iakovos Ouranos, Petros S. Stefaneas, Panayiotis Frangos:
Using the OTS/CafeOBJ Method to Formally Specify and Verify the Open Mobile Alliance License Choice Algorithm. 424-438 - José A. R. Pacheco de Carvalho, Nuno Marques, Hugo Veiga, C. F. Ribeiro Pacheco, Antonio D. Reis
:
Extended Field Performance Evaluation of a Gbps FSO Link. 439-446
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.