Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings

Front Cover
Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You
Springer, Sep 25, 2015 - Computers - 354 pages
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as part of the 23rd IFIP World Computer Congress, WCC 2015, in Daejeon, Korea, in October 2015. The 35 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers have been organized in the following topical sections: networks and systems architecture; teaching and education; authentication and profiling; data management and information advertizing; applied modeling and simulation; network security; dependable systems and applications, multimedia security; cryptography; big data and text mining, and social impact of EIS and visualization.
 

Contents

Reducing Keepalive Traffic in SoftwareDefined Mobile Networks with Port Control Protocol
3
A SDN Based Method of TCP Connection Handover
13
IP Data Delivery in HBBNext Network Architecture
20
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter
30
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure
40
Teaching and Education
50
Making Computer Science Education Relevant
51
Analyzing Brain Waves for Activity Recognition of Learners
64
Secure Database Using OrderPreserving Encryption Scheme Based on Arithmetic Coding and Noise Function
193
An Approach for Evaluating Softgoals Using Weight
203
An Efficient Unsavory Data Detection Method for Internet Big Data
213
Identification of Corrupted Cloud Storage in Batch Auditing
221
Multimedia Security
226
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device
229
A Lossless Data Hiding Strategy Based on TwoDimensional SideMatch Predictions
235
Secure Image Deduplication in Cloud Storage
243

Authentication and Profiling
74
A Multifactor Biometric Based Remote Authentication Using Fuzzy Commitment and Noninvertible Transformation
75
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History
89
Data Management and Information Advertising
97
Strength of Relationship Between Multilabeled Data and Labels
99
Online Adfraud in Search Engine Advertising Campaigns
109
Applied Modeling and Simulation
119
Markov Chain Solution to the 3Tower Problem
120
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem
129
Comparative Study of MonteCarlo Tree Search and AlphaBeta Pruning in Amazons
139
Network Security
149
Can We Securely Use CBC Mode in TLS10?
151
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks
161
Secure Mobility Management for MIPv6 with IdentityBased Cryptography
173
Investigation of DDoS Attacks by Hybrid Simulation
179
Dependable Systems and Applications
190
Cryptography
252
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to AttributeBased Encryption Without Key Misuse
255
Differential Fault Attack on LEA
265
A Secure Multicast Key Agreement Scheme
275
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution
282
Big Data and Text Mining
286
A Distributed ColumnOriented Database Engine for Big Data Analytics
289
Incorporating Big Data Analytics into Enterprise Information Systems
300
Analytical Platform Based on Jbowl Library Providing TextMining Services in Distributed Environment
310
Social Impact of EIS and Visualization
320
Corporate Social Responsibility in Social Media Environment
323
Identifying Factors During Implementation that Impact Use
333
Software Model Creation with Multidimensional UML
343
Author Index
353
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information