Information and Communication Technology (Record no. 94923)

000 -LEADER
fixed length control field 13578nam a22006855i 4500
001 - CONTROL NUMBER
control field 978-3-642-36818-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730193917.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130305s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642368189
-- 978-3-642-36818-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-36818-9
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.C66
072 #7 - SUBJECT CATEGORY CODE
Subject category code UBJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM079000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UBJ
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 303.4834
Edition number 23
245 10 - TITLE STATEMENT
Title Information and Communication Technology
Medium [electronic resource] :
Remainder of title International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings /
Statement of responsibility, etc. edited by Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2013.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2013.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 552 p. 170 illus.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Information Systems and Applications, incl. Internet/Web, and HCI,
International Standard Serial Number 2946-1642 ;
Volume/sequential designation 7804
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping LicenseAgreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving ClusteringProtocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction ofFace-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-PurposeMany-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent SurveillanceSystem.- Shifting Primes.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and civilization.
9 (RLIN) 21733
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information storage and retrieval systems.
9 (RLIN) 22213
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application software.
9 (RLIN) 154941
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 1973
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 9168
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and Society.
9 (RLIN) 31668
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information Storage and Retrieval.
9 (RLIN) 23927
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer and Information Systems Applications.
9 (RLIN) 154942
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31769
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Communication Networks.
9 (RLIN) 154943
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mustofa, Khabib.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 154944
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Neuhold, Erich.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 154945
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tjoa, A Min.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 154946
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Weippl, Edgar R.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 154947
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name You, Ilsun.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 154948
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 154949
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783642368172
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783642368196
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information Systems and Applications, incl. Internet/Web, and HCI,
International Standard Serial Number 2946-1642 ;
Volume/sequential designation 7804
9 (RLIN) 154950
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-642-36818-9">https://doi.org/10.1007/978-3-642-36818-9</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.