- Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme. ICT-EurAsia 2014: 564-575 - Charnsak Srisawatsakul
, Gerald Quirchmayr, Borworn Papasratorn:
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study. ICT-EurAsia 2014: 56-65 - Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif
:
Formalizing Information Flow Control in a Model-Driven Approach. ICT-EurAsia 2014: 456-461 - Wikan Danar Sunindyo, Bayu Hendradjaya, G. A. Putri Saptawati, Tricya Esterina Widagdo:
Document Tracking Technology to Support Indonesian Local E-Governments. ICT-EurAsia 2014: 338-347 - Aldo Suwandi, Inggriani Liem, Saiful Akbar
:
Concern Based SaaS Application Architectural Design. ICT-EurAsia 2014: 228-237 - Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:
Implementation of Efficient Operations over GF(232) Using Graphics Processing Units. ICT-EurAsia 2014: 602-611 - Zhu Tang, Chunqing Wu, Zhenqian Feng, Baokang Zhao, Wanrong Yu:
Improving Availability through Energy-Saving Optimization in LEO Satellite Networks. ICT-EurAsia 2014: 680-689 - Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama:
On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems. ICT-EurAsia 2014: 511-520 - Fathul Wahid
, Øystein Sæbø:
Understanding eParticipation Services in Indonesian Local Government. ICT-EurAsia 2014: 328-337 - Shuichiro Yamamoto:
An Evaluation of Argument Patterns Based on Data Flow. ICT-EurAsia 2014: 432-437 - Akihiro Yamamura
:
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem. ICT-EurAsia 2014: 554-563 - Cheng-Hsing Yang, Kuan-Liang Liu, Chun-Hao Chang, Yi-Jhong Jhang:
High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods. ICT-EurAsia 2014: 622-632 - Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient Variant of Rainbow without Triangular Matrix Representation. ICT-EurAsia 2014: 532-541 - Jun Ye, Wujun Zhang, Shu-Lin Wu, Yuan-Yuan Gao, Jia-Tao Qiu:
Attribute-Based Fine-Grained Access Control with User Revocation. ICT-EurAsia 2014: 586-595 - Shang-nan Yin, Zhi-Guo Chen
, Sung-Ryul Kim:
LDFGB Algorithm for Anomaly Intrusion Detection. ICT-EurAsia 2014: 396-404 - Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen:
An Effective Cloud-Based Active Defense System against Malicious Codes. ICT-EurAsia 2014: 690-695 - Jianyi Zhou, Bo Liu, Baokang Zhao, Bo Liu:
A Pipeline Optimization Model for QKD Post-processing System. ICT-EurAsia 2014: 472-481 - Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa
, Ilsun You:
Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings. Lecture Notes in Computer Science 8407, Springer 2014, ISBN 978-3-642-55031-7 [contents] - 2013
- Sedigheh Abbasi, Stelvio Cimato
, Ernesto Damiani
:
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol. ICT-EurAsia 2013: 447-452 - Nur Azman Abu
, Ferda Ernawan
, Nanna Suryana
, Shahrin Sahib:
Image Watermarking Using Psychovisual Threshold over the Edge. ICT-EurAsia 2013: 519-527 - Nisreen Alam Aldeen, Gerald Quirchmayr:
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control. ICT-EurAsia 2013: 441-446 - Alessandro Armando
, Aniello Castiglione
, Gabriele Costa
, Ugo Fiore
, Alessio Merlo, Luca Verderame
, Ilsun You:
Trustworthy Opportunistic Access to the Internet of Services. ICT-EurAsia 2013: 469-478 - Muhammad Asfand-e-yar, A Min Tjoa
:
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement. ICT-EurAsia 2013: 233-242 - Kensuke Baba
, Serina Egawa:
A Data Structure for Efficient Biometric Identification. ICT-EurAsia 2013: 528-533 - Susmit Bagchi
:
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs. ICT-EurAsia 2013: 81-90 - Thu Le Thi Bao, Tran Khanh Dang
:
Semantic-Aware Obfuscation for Location Privacy at Database Level. ICT-EurAsia 2013: 111-120 - Robert P. Biuk-Aghai
, Hari Venkatesan
:
TransWiki: Supporting Translation Teaching. ICT-EurAsia 2013: 31-40 - Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez
:
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data. ICT-EurAsia 2013: 426-440 - Jakub Breier
, Ladislav Hudec:
On Identifying Proper Security Mechanisms. ICT-EurAsia 2013: 285-294 - Thach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc Dinh Nguyen:
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet. ICT-EurAsia 2013: 324-330