E-Business and Telecommunications

International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers

Editors:

ISBN: 978-3-642-35754-1 (Print) 978-3-642-35755-8 (Online)

Table of contents (37 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Speakers

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-19

      Biometric Privacy Protection: Guidelines and Technologies

    3. No Access

      Book Chapter

      Pages 20-32

      Face Recognition in Uncontrolled Environments, Experiments in an Airport

    4. No Access

      Book Chapter

      Pages 33-40

      Paradigms of Distributed Software Systems: Services, Processes and Self-organization

  3. Part I: Data Communication Networking

    1. Front Matter

      Pages 41-41

    2. No Access

      Book Chapter

      Pages 43-59

      A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks

    3. No Access

      Book Chapter

      Pages 60-73

      Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph Transformation

    4. No Access

      Book Chapter

      Pages 74-81

      Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography

  4. Part II: e-Business

    1. Front Matter

      Pages 83-83

    2. No Access

      Book Chapter

      Pages 85-99

      Selection of Information-Intensive Services: A Multi-criteria Decision Model

    3. No Access

      Book Chapter

      Pages 100-114

      Territorial Safety Networks

    4. No Access

      Book Chapter

      Pages 115-128

      Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User Groups

    5. No Access

      Book Chapter

      Pages 129-140

      To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search Advertising

    6. No Access

      Book Chapter

      Pages 141-155

      Client-Oriented Preferences Model for QoS Aggregation in Service-Based Applications

    7. No Access

      Book Chapter

      Pages 156-167

      An Answer to “Who Needs a Stylus?” on Handwriting Recognition on Mobile Devices

    8. No Access

      Book Chapter

      Pages 168-181

      Application of Metamorphic Testing to a Case Study in Web Services Compositions

  5. Part III: Optical Communication Systems

    1. Front Matter

      Pages 183-183

    2. No Access

      Book Chapter

      Pages 185-199

      Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division Multiplexing

  6. Part IV: Security and Cryptography

    1. Front Matter

      Pages 201-201

    2. No Access

      Book Chapter

      Pages 203-216

      Spam Filtering through Anomaly Detection

    3. No Access

      Book Chapter

      Pages 217-232

      On the Feasibility of Malware Attacks in Smartphone Platforms

    4. No Access

      Book Chapter

      Pages 233-248

      Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme

    5. No Access

      Book Chapter

      Pages 249-263

      Accelerating Reduction for Enabling Fast Multiplication over Large Binary Fields

    6. No Access

      Book Chapter

      Pages 264-280

      A Related-Key Attack against Multiple Encryption Based on Fixed Points

    7. No Access

      Book Chapter

      Pages 281-295

      Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl

previous Page of 2