Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, ProceedingsIsmail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as part of the 23rd IFIP World Computer Congress, WCC 2015, in Daejeon, Korea, in October 2015. The 35 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers have been organized in the following topical sections: networks and systems architecture; teaching and education; authentication and profiling; data management and information advertizing; applied modeling and simulation; network security; dependable systems and applications, multimedia security; cryptography; big data and text mining, and social impact of EIS and visualization. |
Contents
3 | |
13 | |
20 | |
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter | 30 |
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure | 40 |
Teaching and Education | 50 |
Making Computer Science Education Relevant | 51 |
Analyzing Brain Waves for Activity Recognition of Learners | 64 |
Secure Database Using OrderPreserving Encryption Scheme Based on Arithmetic Coding and Noise Function | 193 |
An Approach for Evaluating Softgoals Using Weight | 203 |
An Efficient Unsavory Data Detection Method for Internet Big Data | 213 |
Identification of Corrupted Cloud Storage in Batch Auditing | 221 |
Multimedia Security | 226 |
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device | 229 |
A Lossless Data Hiding Strategy Based on TwoDimensional SideMatch Predictions | 235 |
Secure Image Deduplication in Cloud Storage | 243 |
Authentication and Profiling | 74 |
A Multifactor Biometric Based Remote Authentication Using Fuzzy Commitment and Noninvertible Transformation | 75 |
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History | 89 |
Data Management and Information Advertising | 97 |
Strength of Relationship Between Multilabeled Data and Labels | 99 |
Online Adfraud in Search Engine Advertising Campaigns | 109 |
Applied Modeling and Simulation | 119 |
Markov Chain Solution to the 3Tower Problem | 120 |
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem | 129 |
Comparative Study of MonteCarlo Tree Search and AlphaBeta Pruning in Amazons | 139 |
Network Security | 149 |
Can We Securely Use CBC Mode in TLS10? | 151 |
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks | 161 |
Secure Mobility Management for MIPv6 with IdentityBased Cryptography | 173 |
Investigation of DDoS Attacks by Hybrid Simulation | 179 |
Dependable Systems and Applications | 190 |
Cryptography | 252 |
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to AttributeBased Encryption Without Key Misuse | 255 |
Differential Fault Attack on LEA | 265 |
A Secure Multicast Key Agreement Scheme | 275 |
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution | 282 |
Big Data and Text Mining | 286 |
A Distributed ColumnOriented Database Engine for Big Data Analytics | 289 |
Incorporating Big Data Analytics into Enterprise Information Systems | 300 |
Analytical Platform Based on Jbowl Library Providing TextMining Services in Distributed Environment | 310 |
Social Impact of EIS and Visualization | 320 |
Corporate Social Responsibility in Social Media Environment | 323 |
Identifying Factors During Implementation that Impact Use | 333 |
Software Model Creation with Multidimensional UML | 343 |
353 | |
Other editions - View all
Common terms and phrases
2015 and CONFENIS AdWords algorithm Alpha-Beta pruning analysis applications architecture authentication big data analytics biometric Bloom Filter CBC mode ciphertext client cloud server cloud storage clustering cnd2 computing data objects database decryption deduplication developed diagrams distributed efficient encryption encryption scheme evaluation Facebook feature space Federation for Information Google GPRS group key hash functions HBB-Next ICT-EurAsia IEEE IFIP International Federation implementation Information Processing 2015 input Internet IP address IPSec keepalive keepalive interval key tree Keywords LNCS method middlebox mobile nodes OpenFlow operator optimization orthonormal matrix output packets paper performance player problem proposed protocol quantum key distribution query random satisfies cnd secret key secure filter set of labels simulation smartphone social media softgoals SYN flood Technology terminal fingerprint text mining traffic UnifyCore University vector