logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Information and Communication Technology: International Conference, Ict-Eurasia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings

Information and Communication Technology: International Conference, Ict-Eurasia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings (Paperback, 2013)

A Min Tjoa, Erich Neuhold, Khabib Mustofa (엮은이)
  |  
Springer-Verlag New York Inc
2013-02-20
  |  
93,100원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 76,340원 -18% 0원 3,820원 72,520원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Information and Communication Technology: International Conference, Ict-Eurasia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings

책 정보

· 제목 : Information and Communication Technology: International Conference, Ict-Eurasia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings (Paperback, 2013) 
· 분류 : 외국도서 > 컴퓨터 > 시스템 관리 > 저장/검색
· ISBN : 9783642368172
· 쪽수 : 552쪽

목차

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.-?Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.-?Early-Detection System for Cross-Language (Translated) Plagiarism.-?TransWiki: Supporting Translation Teaching.-?Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability ? Motivation - Opportunity Framework.- Software Development Methods in the Internet of Things.-?SAT?Based Bounded Strong Satisfiability Checking of Reactive System Specifications.-?OSMF: A Framework for OSS Process Measurement.-?Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.-?Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.-?On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.-?Semantic-Aware Obfuscation for Location Privacy at Database Level.-?Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.-?CAPTCHA Suitable for Smartphones.-?Code Based KPD Scheme with Full Connectivity: Deterministic Merging.-?Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.-?End-to-End Delay Performance for VoIP on LTE System in Access Network.-?Mobile Collaboration Technology in Engineering Asset Maintenance ? What Technology, Organisation and People Approaches Are Required.-?A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.-?Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.-?Information Systems Strategic Planning for a Naval Hospital.-?Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.-?A Data-Driven Approach toward Building Dynamic Ontology.-?Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.- Secure and Verifiable Outsourcing of Sequence Comparisons.-?Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.-?On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).-?DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.-?On Identifying Proper Security Mechanisms.-?A Recovery Approach for SQLite History Recorders from YAFFS2.-?UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.-?SA4WSs: A Security Architecture for Web Services.-?Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.-?A Test Case Generation Technique for VMM Fuzzing.-?A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.-?A Proposal on Security Case Based on Common Criteria.-?An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.- Anonymous Lattice-Based Broadcast Encryption.-?Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.-?New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.-?Provably Secure and Subliminal-Free Variant of Schnorr Signature.-?A Block Cipher Mode of Operation with Two Keys.-?On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.-?Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.-?Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.-?Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.-?A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.- CSP-Based General Detection Model of Network Covert Storage Channels.-?Trustworthy Opportunistic Access to the Internet of Services.-?Architecture of Network Environment for High-Risk Security Experimentation.-?Emulation on the Internet Prefix Hijacking Attack Impaction.-?Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.-?Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.-?A Review of Security Attacks on the GSM Standard.- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.-?Image Watermarking Using Psychovisual Threshold over the Edge.-?A Data Structure for Efficient Biometric Identification.-?The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.-?Shifting Primes on OpenRISC Processors with Hardware Multiplier.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.-?Early-Detection System for Cross-Language (Translated) Plagiarism.-?TransWiki: Supporting Translation Teaching.-?Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability ? Motivation - Opportunity Framework.- Software Development Methods in the Internet of Things.-?SAT?Based Bounded Strong Satisfiability Checking of Reactive System Specifications.-?OSMF: A Framework for OSS Process Measurement.-?Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.-?Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.-?On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.-?Semantic-Aware Obfuscation for Location Privacy at Database Level.-?Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.-?CAPTCHA Suitable for Smartphones.-?Code Based KPD Scheme with Full Connectivity: Deterministic Merging.-?Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.-?End-to-End Delay Performance for VoIP on LTE System in Access Network.-?Mobile Collaboration Technology in Engineering Asset Maintenance ? What Technology, Organisation and People Approaches Are Required.-?A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.-?Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.-?Information Systems Strategic Planning for a Naval Hospital.-?Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.-?A Data-Driven Approach toward Building Dynamic Ontology.-?Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.- Secure and Verifiable Outsourcing of Sequence Comparisons.-?Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.-?On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).-?DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.-?On Identifying Proper Security Mechanisms.-?A Recovery Approach for SQLite History Recorders from YAFFS2.-?UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.-?SA4WSs: A Security Architecture for Web Services.-?Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.-?A Test Case Generation Technique for VMM Fuzzing.-?A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.-?A Proposal on Security Case Based on Common Criteria.-?An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.- Anonymous Lattice-Based Broadcast Encryption.-?Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.-?New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.-?Provably Secure and Subliminal-Free Variant of Schnorr Signature.-?A Block Cipher Mode of Operation with Two Keys.-?On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.-?Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.-?Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.-?Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.-?A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.- CSP-Based General Detection Model of Network Covert Storage Channels.-?Trustworthy Opportunistic Access to the Internet of Services.-?Architecture of Network Environment for High-Risk Security Experimentation.-?Emulation on the Internet Prefix Hijacking Attack Impaction.-?Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.-?Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.-?A Review of Security Attacks on the GSM Standard.- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.-?Image Watermarking Using Psychovisual Threshold over the Edge.-?A Data Structure for Efficient Biometric Identification.-?The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.-?Shifting Primes on OpenRISC Processors with Hardware Multiplier.

저자소개

Khabib Mustofa (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책