e-Business and Telecommunications

7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers

ISBN: 978-3-642-25205-1 (Print) 978-3-642-25206-8 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Paper

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-35

      e-Business Challenges and Directions: Important Themes from the First ICE-B Workshop

  3. Part I: Data Communication Networking (DCNET)

    1. Front Matter

      Pages 37-37

    2. No Access

      Book Chapter

      Pages 39-53

      Static Analysis of Routing and Firewall Policy Configurations

    3. No Access

      Book Chapter

      Pages 54-70

      Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks

    4. No Access

      Book Chapter

      Pages 71-83

      The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA

    5. No Access

      Book Chapter

      Pages 84-94

      Mobile Applications Middleware for File Swapping

  4. Part II: e-Business (ICE-B)

    1. Front Matter

      Pages 95-95

    2. No Access

      Book Chapter

      Pages 97-111

      Optimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information System on the Basis of Real-Life Usability Research

    3. No Access

      Book Chapter

      Pages 112-130

      A Social Location-Based Emergency Service to Eliminate the Bystander Effect

  5. Part III: Optical Communication Systems (OPTICS)

    1. Front Matter

      Pages 131-131

    2. No Access

      Book Chapter

      Pages 133-144

      Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality Environments

  6. Part IV: Security and Cryptography (SECRYPT)

    1. Front Matter

      Pages 145-145

    2. No Access

      Book Chapter

      Pages 147-157

      Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕ 

    3. No Access

      Book Chapter

      Pages 158-171

      Modelling Uncertain and Time-Dependent Security Labels in MLS Systems

    4. No Access

      Book Chapter

      Pages 172-187

      Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity

    5. No Access

      Book Chapter

      Pages 188-202

      Stream Cipher-Based Hash Function and Its Security

    6. No Access

      Book Chapter

      Pages 203-219

      Flexible Anonymous Subscription Schemes

    7. No Access

      Book Chapter

      Pages 220-232

      Proxiable Designated Verifier Signature

    8. No Access

      Book Chapter

      Pages 233-242

      Adaptive and Composable Non-interactive String-Commitment Protocols

    9. No Access

      Book Chapter

      Pages 243-258

      Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes

    10. No Access

      Book Chapter

      Pages 259-273

      Threshold Discernible Ring Signatures

    11. No Access

      Book Chapter

      Pages 274-288

      Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries

    12. No Access

      Book Chapter

      Pages 289-303

      Selectively Traceable Anonymous and Unlinkable Token-Based Transactions

    13. No Access

      Book Chapter

      Pages 304-318

      An Encryption Scheme for a Secure Policy Updating

previous Page of 2