Normal view
MARC view
Information and Communication Technology (Record no. 357778)
[ view plain ]
000 -Маркер записи | |
---|---|
Контрольное поле постоянной длины | 13093nam a22006015i 4500 |
001 - Контрольный номер | |
Контрольное поле | vtls000484774 |
005 - Дата корректировки | |
Контрольное поле | 20210922070109.0 |
007 - Кодируемые данные (физ. описан.) | |
Контрольное поле постоянной длины | cr nn 008mamaa |
008 - Кодируемые данные | |
Контрольное поле постоянной длины | 140715s2013 gw | s |||| 0|eng d |
020 ## - Индекс ISBN | |
ISBN | 9783642368189 |
-- | 978-3-642-36818-9 |
024 7# - Прочие стандартные номера | |
Стандартный номер | 10.1007/978-3-642-36818-9 |
Источник номера | doi |
035 ## - Системный контрольный номер | |
Системный контрольный номер | to000484774 |
040 ## - Источник каталогиз. | |
Служба первич. каталог. | Springer |
Служба, преобразующая запись | Springer |
Организация, изменившая запись | RU-ToGU |
050 #4 - Расстановочный код библ. Конгресса | |
Классификационный индекс | QA76.9.C66 |
072 #7 - Код предметной/темат. категории | |
Код предметной/темат. категории | UBJ |
Источник кода | bicssc |
072 #7 - Код предметной/темат. категории | |
Код предметной/темат. категории | COM079000 |
Источник кода | bisacsh |
082 04 - Индекс Дьюи | |
Индекс Дьюи | 004 |
Номер издания | 23 |
100 1# - Автор | |
Автор | Mustofa, Khabib. |
Роль лиц | editor. |
9 (RLIN) | 416285 |
245 10 - Заглавие | |
Заглавие | Information and Communication Technology |
Физический носитель | [electronic resource] : |
Продолж. заглавия | International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / |
Ответственность | edited by Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You. |
260 ## - Выходные данные | |
Место издания | Berlin, Heidelberg : |
Издательство | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Дата издания | 2013. |
300 ## - Физическое описание | |
Объем | XVI, 552 p. 170 illus. |
Иллюстрации/тип воспроизводства | online resource. |
336 ## - Тип содержимого | |
Тип содержимого | text |
Content type code | txt |
Source | rdacontent |
337 ## - Средство доступа | |
Средство доступа | computer |
Media type code | c |
Source | rdamedia |
338 ## - Тип носителя | |
Тип носителя | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - Серия | |
Заглавие серии | Lecture Notes in Computer Science, |
ISSN серии | 0302-9743 ; |
№ тома | 7804 |
505 0# - Примечание о содержании | |
Содержание | Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting P. |
520 ## - Аннотация | |
Аннотация | This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security. |
650 #0 - Тематические рубрики | |
Основная рубрика | Computer Science. |
9 (RLIN) | 155490 |
650 #0 - Тематические рубрики | |
Основная рубрика | Computer Communication Networks. |
9 (RLIN) | 566243 |
650 #0 - Тематические рубрики | |
Основная рубрика | Data protection. |
9 (RLIN) | 303937 |
650 #0 - Тематические рубрики | |
Основная рубрика | Data encryption (Computer science). |
9 (RLIN) | 566260 |
650 #0 - Тематические рубрики | |
Основная рубрика | Information storage and retrieval systems. |
9 (RLIN) | 137013 |
650 14 - Тематические рубрики | |
Основная рубрика | Computer Science. |
9 (RLIN) | 155490 |
650 24 - Тематические рубрики | |
Основная рубрика | Computers and Society. |
9 (RLIN) | 303251 |
650 24 - Тематические рубрики | |
Основная рубрика | Systems and Data Security. |
9 (RLIN) | 303939 |
650 24 - Тематические рубрики | |
Основная рубрика | Information Storage and Retrieval. |
9 (RLIN) | 303027 |
650 24 - Тематические рубрики | |
Основная рубрика | Information Systems Applications (incl. Internet). |
9 (RLIN) | 299051 |
650 24 - Тематические рубрики | |
Основная рубрика | Data Encryption. |
9 (RLIN) | 566261 |
650 24 - Тематические рубрики | |
Основная рубрика | Computer Communication Networks. |
9 (RLIN) | 566243 |
700 1# - Другие авторы | |
Другие авторы | Neuhold, Erich J. |
Роль лиц | editor. |
9 (RLIN) | 416287 |
700 1# - Другие авторы | |
Другие авторы | Tjoa, A. Min. |
Роль лиц | editor. |
9 (RLIN) | 81503 |
700 1# - Другие авторы | |
Другие авторы | Weippl, Edgar. |
Роль лиц | editor. |
9 (RLIN) | 308446 |
700 1# - Другие авторы | |
Другие авторы | You, Ilsun. |
Роль лиц | editor. |
9 (RLIN) | 416288 |
710 2# - Другие организации | |
Организация/юрисдикция | SpringerLink (Online service) |
9 (RLIN) | 143950 |
773 0# - Источник информации | |
Название источника | Springer eBooks |
830 #0 - Заголовок добавочной библ.записи на серию — унифицированное заглавие | |
Унифицированное заглавие | Lecture Notes in Computer Science, |
9 (RLIN) | 279505 |
856 40 - Электронный адрес документа | |
URL | <a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a> |
912 ## - Coursera for Campus: онлайн курсы для ТГУ | |
Coursera for Campus: онлайн курсы для ТГУ | ZDB-2-SCS |
912 ## - Coursera for Campus: онлайн курсы для ТГУ | |
Coursera for Campus: онлайн курсы для ТГУ | ZDB-2-LNC |
999 ## - Системные контрольные номера (Koha) | |
biblionumber (Koha) | 357778 |
No items available.