Invited Paper |
|
|
e-Business Challenges and Directions: Important Themes from the First ICE-B Workshop |
|
|
3 | (36) |
|
|
|
|
|
|
Part I Data Communication Networking (DCNET) |
|
|
|
Static Analysis of Routing and Firewall Policy Configurations |
|
|
39 | (15) |
|
|
|
|
|
|
Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks |
|
|
54 | (17) |
|
|
|
|
The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA |
|
|
71 | (13) |
|
|
|
|
Mobile Applications Middleware for File Swapping |
|
|
84 | (13) |
|
|
|
|
Part II e-Business (ICE-B) |
|
|
|
Optimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information System on the Basis of Real-Life Usability Research |
|
|
97 | (15) |
|
|
|
|
|
A Social Location-Based Emergency Service to Eliminate the Bystander Effect |
|
|
112 | (21) |
|
|
|
|
Part III Optical Communication Systems (OPTICS) |
|
|
|
Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality Environments |
|
|
133 | (14) |
|
|
|
|
Part IV Security and Cryptography (SECRYPT) |
|
|
|
Differential Resynchronization Attacks on Reduced Round SNOW 3G |
|
|
147 | (11) |
|
|
|
|
Modelling Uncertain and Time-Dependent Security Labels in MLS Systems |
|
|
158 | (14) |
|
|
|
|
|
|
|
|
Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity |
|
|
172 | (16) |
|
|
|
Stream Cipher-Based Hash Function and Its Security |
|
|
188 | (15) |
|
|
|
|
|
Flexible Anonymous Subscription Schemes |
|
|
203 | (17) |
|
Maria Isabel Gonzalez Vasco |
|
|
|
|
Proxiable Designated Verifier Signature |
|
|
220 | (13) |
|
|
|
|
|
Adaptive and Composable Non-interactive String-Commitment Protocols |
|
|
233 | (10) |
|
|
|
|
|
Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes |
|
|
243 | (16) |
|
|
|
|
Threshold Discernible Ring Signatures |
|
|
259 | (15) |
|
|
|
|
|
|
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries |
|
|
274 | (15) |
|
|
|
|
|
Selectively Traceable Anonymous and Unlinkable Token-Based Transactions |
|
|
289 | (15) |
|
|
|
An Encryption Scheme for a Secure Policy Updating |
|
|
304 | (15) |
|
|
|
|
Machine Learning for the Detection of Spam in Twitter Networks |
|
|
319 | (18) |
|
|
Part V Signal Processing and Multimedia Applications (SIGMAP) |
|
|
|
Deformable Multi-object Tracking Using Full Pixel Matching of Image |
|
|
337 | (13) |
|
|
|
|
|
A Multi-sensor System for Monitoring the Performance of Elite Swimmers |
|
|
350 | (13) |
|
|
|
|
|
|
|
|
Maximum a Posteriori Decoding of Arithmetic Codes in Joint Source-Channel Coding |
|
|
363 | (15) |
|
|
|
An Ensemble Approach to Improve Microaneurysm Candidate Extraction |
|
|
378 | (17) |
|
|
|
|
Part VI Wireless Information Networks and Systems (WINSYS) |
|
|
|
Modulation-Mode Assignment for SVD-Aided and BICM-Assisted Downlink Multiuser MIMO Transmission Schemes |
|
|
395 | (15) |
|
|
|
Evaluation of the Performance of Polarization Diversity Estimated from Measurements at One Polarization |
|
|
410 | (14) |
|
|
|
Using the OTS/CafeOBJ Method to Formally Specify and Verify the Open Mobile Alliance License Choice Algorithm |
|
|
424 | (15) |
|
|
|
|
|
Extended Field Performance Evaluation of a Gbps FSO Link |
|
|
439 | (8) |
|
J.A.R. Pacheco de Carvalho |
|
|
|
|
|
Author Index |
|
447 | |