- 2015
- Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba
, Shigeru Takano, Kazuaki J. Murakami:
Analyzing Brain Waves for Activity Recognition of Learners. ICT-EurAsia/CONFENIS 2015: 64-73 - Yana A. Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor V. Kotenko
:
Investigation of DDoS Attacks by Hybrid Simulation. ICT-EurAsia/CONFENIS 2015: 179-189 - Andrej Binder, Tomas Boros, Ivan Kotuliak:
A SDN Based Method of TCP Connection Handover. ICT-EurAsia/CONFENIS 2015: 13-19 - Roman Bronis, Ivan Kotuliak, Tomas Kovacik
, Peter Trúchly
, Andrej Binder:
IP Data Delivery in HBB-Next Network Architecture. ICT-EurAsia/CONFENIS 2015: 20-29 - Kamil Burda
, Martin Nagy, Ivan Kotuliak:
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol. ICT-EurAsia/CONFENIS 2015: 3-12 - Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse. ICT-EurAsia/CONFENIS 2015: 255-264 - Hsing-Chung Chen, Chung-Wei Chen:
A Secure Multicast Key Agreement Scheme. ICT-EurAsia/CONFENIS 2015: 275-281 - Mi-Young Cho, Young-Sook Jeong:
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device. ICT-EurAsia/CONFENIS 2015: 229-234 - Guido David:
Markov Chain Solution to the 3-Tower Problem. ICT-EurAsia/CONFENIS 2015: 121-128 - Han Gang, Hongyang Yan, Lingling Xu:
Secure Image Deduplication in Cloud Storage. ICT-EurAsia/CONFENIS 2015: 243-251 - Lukás Gregorovic, Ivan Polásek
, Branislav Sobota
:
Software Model Creation with Multidimensional UML. ICT-EurAsia/CONFENIS 2015: 343-352 - Nan Guo, Fangting Peng, Tianhan Gao:
Secure Mobility Management for MIPv6 with Identity-Based Cryptography. ICT-EurAsia/CONFENIS 2015: 173-178 - Tomás Halagan, Tomas Kovacik
, Peter Trúchly
, Andrej Binder:
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter. ICT-EurAsia/CONFENIS 2015: 30-39 - Dirmanto Jap, Jakub Breier
:
Differential Fault Attack on LEA. ICT-EurAsia/CONFENIS 2015: 265-274 - Hikari Kato, Szilárd Zsolt Fazekas
, Mayumi Takaya, Akihiro Yamamura
:
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons. ICT-EurAsia/CONFENIS 2015: 139-148 - Priagung Khusumanegara, Rischan Mafrur
, Deokjai Choi:
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History. ICT-EurAsia/CONFENIS 2015: 89-96 - David Kiwana, Björn Johansson
, Sven A. Carlsson:
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use. ICT-EurAsia/CONFENIS 2015: 333-342 - Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva:
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function. ICT-EurAsia/CONFENIS 2015: 193-202 - Takashi Kurokawa, Ryo Nojima, Shiho Moriai:
Can We Securely Use CBC Mode in TLS1.0? ICT-EurAsia/CONFENIS 2015: 151-160 - Masahiro Kuzunishi, Tetsuya Furukawa:
Strength of Relationship Between Multi-labeled Data and Labels. ICT-EurAsia/CONFENIS 2015: 99-108 - Yanchen Liu, Fang Cao, Masood S. Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang:
DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics. ICT-EurAsia/CONFENIS 2015: 289-299 - Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You:
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract. ICT-EurAsia/CONFENIS 2015: 282-285 - Andreas Mladenow
, Niina Maarit Novak
, Christine Strauss
:
Online Ad-fraud in Search Engine Advertising Campaigns - Prevention, Detection and Damage Limitation. ICT-EurAsia/CONFENIS 2015: 109-118 - Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak:
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure. ICT-EurAsia/CONFENIS 2015: 40-49 - Thi Ai Thao Nguyen, Dinh Thanh Nguyen, Tran Khanh Dang
:
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation. ICT-EurAsia/CONFENIS 2015: 77-88 - Antonín Pavlícek
, Petr Doucek
:
Corporate Social Responsibility in Social Media Environment. ICT-EurAsia/CONFENIS 2015: 323-332 - Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu:
An Efficient Unsavory Data Detection Method for Internet Big Data. ICT-EurAsia/CONFENIS 2015: 213-220 - N. Renugadevi
, C. Mala:
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks. ICT-EurAsia/CONFENIS 2015: 161-172 - Martin Sarnovsky
, Peter Butka
, Peter Bednár, Frantisek Babic
, Ján Paralic:
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment. ICT-EurAsia/CONFENIS 2015: 310-319 - Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon:
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments. ICT-EurAsia/CONFENIS 2015: 221-225