© 2015

Information and Communication Technology

Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings

  • Ismail Khalil
  • Erich Neuhold
  • A Min Tjoa
  • Li Da Xu
  • Ilsun You
Conference proceedings ICT-EurAsia 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9357)

Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNISA, volume 9357)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Networks and System Architecture

    1. Front Matter
      Pages 1-1
    2. Andrej Binder, Tomas Boros, Ivan Kotuliak
      Pages 13-19
    3. Roman Bronis, Ivan Kotuliak, Tomas Kovacik, Peter Truchly, Andrej Binder
      Pages 20-29
    4. Tomáš Halagan, Tomáš Kováčik, Peter Trúchly, Andrej Binder
      Pages 30-39
    5. Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak
      Pages 40-49
  3. Teaching and Education

    1. Front Matter
      Pages 51-51
    2. Michael Weigend
      Pages 53-63
    3. Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba, Shigeru Takano, Kazuaki Murakami
      Pages 64-73
  4. Authentication and Profiling

  5. Data Management and Information Advertising

    1. Front Matter
      Pages 97-97
    2. Masahiro Kuzunishi, Tetsuya Furukawa
      Pages 99-108
    3. Andreas Mladenow, Niina Maarit Novak, Christine Strauss
      Pages 109-118
  6. Applied Modeling and Simulation

    1. Front Matter
      Pages 119-119
    2. Yusuke Watanabe, Mayumi Takaya, Akihiro Yamamura
      Pages 129-138
    3. Hikari Kato, Szilárd Zsolt Fazekas, Mayumi Takaya, Akihiro Yamamura
      Pages 139-148
  7. Network Security

    1. Front Matter
      Pages 149-149
    2. Takashi Kurokawa, Ryo Nojima, Shiho Moriai
      Pages 151-160
    3. Nan Guo, Fangting Peng, Tianhan Gao
      Pages 173-178
    4. Yana Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor Kotenko
      Pages 179-189
  8. Dependable Systems and Applications

    1. Front Matter
      Pages 191-191
    2. Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva
      Pages 193-202
    3. Shuichiro Yamamoto
      Pages 203-212
    4. Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu
      Pages 213-220
    5. Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon
      Pages 221-225
  9. Multimedia Security

    1. Front Matter
      Pages 227-227
    2. Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang
      Pages 235-242
    3. Han Gang, Hongyang Yan, Lingling Xu
      Pages 243-251
  10. Cryptography

    1. Front Matter
      Pages 253-253
    2. Dirmanto Jap, Jakub Breier
      Pages 265-274
    3. Hsing-Chung Chen, Chung-Wei Chen
      Pages 275-281
    4. Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You
      Pages 282-285
  11. Big Data and Text Mining

    1. Front Matter
      Pages 287-287
    2. Yanchen Liu, Fang Cao, Masood Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku et al.
      Pages 289-299
    3. Zhaohao Sun, Francisca Pambel, Fangwei Wang
      Pages 300-309
    4. Martin Sarnovský, Peter Butka, Peter Bednár, František Babič, Ján Paralič
      Pages 310-319
  12. Social Impact of EIS and Visualization

    1. Front Matter
      Pages 321-321
    2. Antonín Pavlíček, Petr Doucek
      Pages 323-332
    3. Lukáš Gregorovič, Ivan Polasek, Branislav Sobota
      Pages 343-352
  13. Back Matter
    Pages 353-354

About these proceedings


This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as part of the 23rd IFIP World Computer Congress, WCC 2015, in Daejeon, Korea, in October 2015. The 35 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers have been organized in the following topical sections: networks and systems architecture; teaching and education; authentication and profiling; data management and information advertizing; applied modeling and simulation; network security; dependable systems and applications, multimedia security; cryptography; big data and text mining, and social impact of EIS and visualization.


big data computer networks cryptograpy data mining dependable systems EIS e-learning education enterprise information systems knowledge management modeling multimedia security network architecture network security privacy security simulation text mining

Editors and affiliations

  • Ismail Khalil
    • 1
  • Erich Neuhold
    • 2
  • A Min Tjoa
    • 3
  • Li Da Xu
    • 4
  • Ilsun You
    • 5
  1. 1.Institute of TelecooperationJohannes Kepler University LinzLinzAustria
  2. 2.Dept of Computer ScienceUniversity of ViennaWienAustria
  3. 3.Institute of Software TechnologyVienna University of TechnologyWienAustria
  4. 4.Information Technology and Decision SciencesOld Dominion UniversityNorfolkUSA
  5. 5.Soon Chun Hyang UniversityAsanKorea (Republic of)

Bibliographic information