e-Business and Telecommunications

6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers

Editors:

ISBN: 978-3-642-20076-2 (Print) 978-3-642-20077-9 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Papers

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-19

      Stochastic Modeling and Statistical Inferences of Adaptive Antennas in Wireless Communications

    3. No Access

      Book Chapter

      Pages 20-36

      Protecting Information Privacy in the Electronic Society

    4. No Access

      Book Chapter

      Pages 37-52

      The Three Fundamental e-Business Models

    5. No Access

      Book Chapter

      Pages 53-67

      Web 2.0: From a Buzzword to Mainstream Web Reality

  3. Part I: e-Business

    1. Front Matter

      Pages 69-69

    2. No Access

      Book Chapter

      Pages 71-81

      Exploring Price Elasticity to Optimize Posted Prices in e-Commerce

    3. No Access

      Book Chapter

      Pages 82-93

      Designing Digital Marketplaces for Competitiveness of SMEs in Developing Countries

    4. No Access

      Book Chapter

      Pages 94-109

      Strategic Planning, Environmental Dynamicity and Their Impact on Business Model Design: The Case of a Mobile Middleware Technology Provider

    5. No Access

      Book Chapter

      Pages 110-125

      Collaboration Strategies in Turbulent Periods: Effects of Perception of Relational Risk on Enterprise Alliances

    6. No Access

      Book Chapter

      Pages 126-138

      A Classification Schema for Mobile-Internet 2.0 Applications

    7. No Access

      Book Chapter

      Pages 139-155

      Plug and Play Transport Chain Management: Agent-Based Support to the Planning and Execution of Transports

  4. Part II: Security and Cryptography

    1. Front Matter

      Pages 157-157

    2. No Access

      Book Chapter

      Pages 159-173

      Exploiting Crosstalk Effects in FPGAs for Generating True Random Numbers

    3. No Access

      Book Chapter

      Pages 174-185

      Offline Peer-to-Peer Broadcast with Anonymity

    4. No Access

      Book Chapter

      Pages 186-198

      Wireless Authentication and Transaction-Confirmation Token

    5. No Access

      Book Chapter

      Pages 199-211

      Optimizations for High-Performance IPsec Execution

    6. No Access

      Book Chapter

      Pages 212-223

      An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks

    7. No Access

      Book Chapter

      Pages 224-236

      Privacy Enhancements for Hardware-Based Security Modules

    8. No Access

      Book Chapter

      Pages 237-250

      Flexible and Time-Based Anonymous Access Restrictions

  5. Part III: Signal Processing and Multimedia Applications

    1. Front Matter

      Pages 251-251

    2. No Access

      Book Chapter

      Pages 253-265

      Robust Numeric Set Watermarking: Numbers Don’t Lie

    3. No Access

      Book Chapter

      Pages 266-277

      Corrupting Noise Estimation Based on Rapid Adaptation and Recursive Smoothing

    4. No Access

      Book Chapter

      Pages 278-290

      Recommender System: A Personalized TV Guide System

previous Page of 2