책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 시스템 관리 > 저장/검색
· ISBN : 9783642368172
· 쪽수 : 552쪽
목차
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.-?Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.-?Early-Detection System for Cross-Language (Translated) Plagiarism.-?TransWiki: Supporting Translation Teaching.-?Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability ? Motivation - Opportunity Framework.- Software Development Methods in the Internet of Things.-?SAT?Based Bounded Strong Satisfiability Checking of Reactive System Specifications.-?OSMF: A Framework for OSS Process Measurement.-?Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.-?Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.-?On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.-?Semantic-Aware Obfuscation for Location Privacy at Database Level.-?Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.-?CAPTCHA Suitable for Smartphones.-?Code Based KPD Scheme with Full Connectivity: Deterministic Merging.-?Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.-?End-to-End Delay Performance for VoIP on LTE System in Access Network.-?Mobile Collaboration Technology in Engineering Asset Maintenance ? What Technology, Organisation and People Approaches Are Required.-?A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.-?Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.-?Information Systems Strategic Planning for a Naval Hospital.-?Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.-?A Data-Driven Approach toward Building Dynamic Ontology.-?Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.- Secure and Verifiable Outsourcing of Sequence Comparisons.-?Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.-?On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).-?DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.-?On Identifying Proper Security Mechanisms.-?A Recovery Approach for SQLite History Recorders from YAFFS2.-?UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.-?SA4WSs: A Security Architecture for Web Services.-?Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.-?A Test Case Generation Technique for VMM Fuzzing.-?A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.-?A Proposal on Security Case Based on Common Criteria.-?An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.- Anonymous Lattice-Based Broadcast Encryption.-?Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.-?New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.-?Provably Secure and Subliminal-Free Variant of Schnorr Signature.-?A Block Cipher Mode of Operation with Two Keys.-?On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.-?Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.-?Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.-?Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.-?A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.- CSP-Based General Detection Model of Network Covert Storage Channels.-?Trustworthy Opportunistic Access to the Internet of Services.-?Architecture of Network Environment for High-Risk Security Experimentation.-?Emulation on the Internet Prefix Hijacking Attack Impaction.-?Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.-?Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.-?A Review of Security Attacks on the GSM Standard.- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.-?Image Watermarking Using Psychovisual Threshold over the Edge.-?A Data Structure for Efficient Biometric Identification.-?The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.-?Shifting Primes on OpenRISC Processors with Hardware Multiplier.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.-?Early-Detection System for Cross-Language (Translated) Plagiarism.-?TransWiki: Supporting Translation Teaching.-?Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability ? Motivation - Opportunity Framework.- Software Development Methods in the Internet of Things.-?SAT?Based Bounded Strong Satisfiability Checking of Reactive System Specifications.-?OSMF: A Framework for OSS Process Measurement.-?Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.-?Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.-?On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.-?Semantic-Aware Obfuscation for Location Privacy at Database Level.-?Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.-?CAPTCHA Suitable for Smartphones.-?Code Based KPD Scheme with Full Connectivity: Deterministic Merging.-?Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.-?End-to-End Delay Performance for VoIP on LTE System in Access Network.-?Mobile Collaboration Technology in Engineering Asset Maintenance ? What Technology, Organisation and People Approaches Are Required.-?A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.-?Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.-?Information Systems Strategic Planning for a Naval Hospital.-?Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.-?A Data-Driven Approach toward Building Dynamic Ontology.-?Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement.- Secure and Verifiable Outsourcing of Sequence Comparisons.-?Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.-?On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).-?DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.-?On Identifying Proper Security Mechanisms.-?A Recovery Approach for SQLite History Recorders from YAFFS2.-?UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.-?SA4WSs: A Security Architecture for Web Services.-?Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.-?A Test Case Generation Technique for VMM Fuzzing.-?A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.-?A Proposal on Security Case Based on Common Criteria.-?An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors.- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.- Anonymous Lattice-Based Broadcast Encryption.-?Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.-?New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.-?Provably Secure and Subliminal-Free Variant of Schnorr Signature.-?A Block Cipher Mode of Operation with Two Keys.-?On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.-?Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.-?Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.-?Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.-?A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.- CSP-Based General Detection Model of Network Covert Storage Channels.-?Trustworthy Opportunistic Access to the Internet of Services.-?Architecture of Network Environment for High-Risk Security Experimentation.-?Emulation on the Internet Prefix Hijacking Attack Impaction.-?Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.-?Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.-?A Review of Security Attacks on the GSM Standard.- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.-?Image Watermarking Using Psychovisual Threshold over the Edge.-?A Data Structure for Efficient Biometric Identification.-?The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.-?Shifting Primes on OpenRISC Processors with Hardware Multiplier.