Abstract is missing.
- Translating the Idea of the eGovernment One-Stop-Shop in IndonesiaFathul Wahid. 1-10 [doi]
- A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the NetworkAi Thao Nguyen Thi, Tran Khanh Dang. 11-20 [doi]
- Early-Detection System for Cross-Language (Translated) PlagiarismKhabib Mustofa, Yosua Albert Sir. 21-30 [doi]
- TransWiki: Supporting Translation TeachingRobert P. Biuk-Aghai, Hari Venkatesan. 31-40 [doi]
- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity FrameworkRajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra. 41-49 [doi]
- Software Development Methods in the Internet of ThingsSelo Sulistyo. 50-59 [doi]
- SAT-Based Bounded Strong Satisfiability Checking of Reactive System SpecificationsMasaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki. 60-70 [doi]
- OSMF: A Framework for OSS Process MeasurementWikan Danar Sunindyo, Fajar Juang Ekaputra. 71-80 [doi]
- Analyzing Stability of Algorithmic Systems Using Algebraic ConstructsSusmit Bagchi. 81-90 [doi]
- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance TuningSuprapto, Retantyo Wardoyo. 91-100 [doi]
- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor QueriesChan Nam Ngo, Tran Khanh Dang. 101-110 [doi]
- Semantic-Aware Obfuscation for Location Privacy at Database LevelThu Le Thi Bao, Tran Khanh Dang. 111-120 [doi]
- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure SketchTran Tri Dang, Quynh Chi Truong, Tran Khanh Dang. 121-130 [doi]
- CAPTCHA Suitable for SmartphonesYusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura. 131-140 [doi]
- Code Based KPD Scheme with Full Connectivity: Deterministic MergingPinaki Sarkar, Aritra Dhar. 141-151 [doi]
- Indonesian Digital Natives - ICT Usage Pattern Study across Different Age GroupsNeila Ramdhani, Wisnu Wiradhany. 152-161 [doi]
- End-to-End Delay Performance for VoIP on LTE System in Access NetworkNg Liang Shen, Noraniah Abdul Aziz, Tutut Herawan. 162-172 [doi]
- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required?Faisal Syafar, Jing Gao. 173-182 [doi]
- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private CloudNguyen Quang-Hung, Pham Dac Nien, Nguyen Hoai Nam, Nguyen Huynh Tuong, Nam Thoai. 183-191 [doi]
- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational InstitutionNungki Selviandro, Zainal A. Hasibuan. 192-201 [doi]
- Information Systems Strategic Planning for a Naval HospitalHery Harjono Muljo, Bens Pardamean. 202-213 [doi]
- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System TechniqueWayan Suparta, Kemal Maulana Alhasa. 214-222 [doi]
- A Data-Driven Approach toward Building Dynamic OntologyDhomas Hatta Fudholi, Wenny Rahayu, Eric Pardede, Hendrik. 223-232 [doi]
- Using Semantic Web to Enhance User Understandability for Online Shopping License AgreementMuhammad Asfand-e-yar, A Min Tjoa. 233-242 [doi]
- Secure and Verifiable Outsourcing of Sequence ComparisonsYansheng Feng, Hua Ma, Xiaofeng Chen 0001, Hui Zhu. 243-252 [doi]
- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on TwitterDongjin Choi, Ilsun You, PanKoo Kim. 253-260 [doi]
- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki. 261-270 [doi]
- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature GenerationHuabiao Lu, BaoKang Zhao, Xiaofeng Wang, Jinshu Su. 271-284 [doi]
- On Identifying Proper Security MechanismsJakub Breier, Ladislav Hudec. 285-294 [doi]
- A Recovery Approach for SQLite History Recorders from YAFFS2Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng. 295-299 [doi]
- UVHM: Model Checking Based Formal Analysis Scheme for HypervisorsYuchao She, Hui Li, Hui Zhu. 300-305 [doi]
- SA4WSs: A Security Architecture for Web ServicesLingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang. 306-311 [doi]
- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic InvestigationShuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu. 312-317 [doi]
- A Test Case Generation Technique for VMM FuzzingXiao Xia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang. 318-323 [doi]
- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via InternetThach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc Dinh Nguyen. 324-330 [doi]
- A Proposal on Security Case Based on Common CriteriaShuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka. 331-336 [doi]
- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core ProcessorsWentao Jia, Rui Li, Chunyuan Zhang. 337-342 [doi]
- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance FrameworksJostein Jensen. 343-352 [doi]
- Anonymous Lattice-Based Broadcast EncryptionAdela Georgescu. 353-362 [doi]
- Supporting Secure Provenance Update by Keeping "Provenance" of the ProvenanceAmril Syalim, Takashi Nishide, Kouichi Sakurai. 363-372 [doi]
- New Ciphertext-Policy Attribute-Based Access Control with Efficient RevocationXingxing Xie 0001, Hua Ma, Jin Li, Xiaofeng Chen 0001. 373-382 [doi]
- Provably Secure and Subliminal-Free Variant of Schnorr SignatureYinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu. 383-391 [doi]
- A Block Cipher Mode of Operation with Two KeysYi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Jing-Hao Yang. 392-398 [doi]
- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret SharingRuxandra F. Olimid. 399-408 [doi]
- Modified Efficient and Secure Dynamic ID-Based User Authentication SchemeToan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong. 409-415 [doi]
- A Simplified Privacy Preserving Message Delivery Protocol in VDTNsYoungho Park, Chul Sur, Kyung Hyune Rhee. 416-425 [doi]
- Confidentiality-Preserving Query Execution of Fragmented Outsourced DataAnis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez. 426-440 [doi]
- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access ControlNisreen Alam Aldeen, Gerald Quirchmayr. 441-446 [doi]
- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering ProtocolSedigheh Abbasi, Stelvio Cimato, Ernesto Damiani. 447-452 [doi]
- A Real-Time Privacy Amplification Scheme in Quantum Key DistributionBo Liu, Bo Liu, BaoKang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You. 453-458 [doi]
- CSP-Based General Detection Model of Network Covert Storage ChannelsHui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li. 459-468 [doi]
- Trustworthy Opportunistic Access to the Internet of ServicesAlessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You. 469-478 [doi]
- Architecture of Network Environment for High-Risk Security ExperimentationXiaohui Kuang, Xiang Li, Jinjing Zhao. 479-484 [doi]
- Emulation on the Internet Prefix Hijacking Attack ImpactionJinjing Zhao, Yan Wen. 485-489 [doi]
- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise ReductionLu Zhao, Ho Seok Kang, Sung-Ryul Kim. 490-495 [doi]
- Unconditionally Secure Fully Connected Key Establishment Using Deployment KnowledgeSarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta. 496-501 [doi]
- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETsHuaqing Wen, Kyung Hyune Rhee. 502-506 [doi]
- A Review of Security Attacks on the GSM StandardGiuseppe Cattaneo, Giancarlo De Maio, Pompeo Faruolo, Umberto Ferraro Petrillo. 507-512 [doi]
- An Extended Multi-secret Images Sharing Scheme Based on Boolean OperationHuan Wang, Mingxing He, Xiao Li. 513-518 [doi]
- Image Watermarking Using Psychovisual Threshold over the EdgeNur Azman Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib. 519-527 [doi]
- A Data Structure for Efficient Biometric IdentificationKensuke Baba, Serina Egawa. 528-533 [doi]
- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance SystemHae-Min Moon, Sung Bum Pan. 534-539 [doi]
- Shifting Primes on OpenRISC Processors with Hardware MultiplierLeandro Marin, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 540-549 [doi]