Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007.
The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
Content Level »Research
Keywords »H.264 - Internet - algorithms - bidding - biometrics - complexity - data mining - e-commerce - e-government - e-shop - hash table - micropayment - mobile service provisioning - pragmatic computing - utility computing
Invited Speakers.- Pragmatic Computing – A Semiotic Perspective to Web Services.- Utility Computing: Reality and Beyond.- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.- I: ICE-B.- Bidding Agents That Perpetrate Auction Fraud.- A Platform for Mobile Service Provisioning Based on SOA-Integration.- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis.- Critical Success Factors of Internet Shopping: The Case of Japan.- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains.- II: SECRYPT.- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.- Securing Biometric Templates Where Similarity Is Measured with Set Intersection.- Score Equalization in SVM Multimodal Fusion for Person Recognition.- Remote Algorithmic Complexity Attacks against Randomized Hash Tables.- Securing Real-Time Sessions in an IMS-Based Architecture.- IPSec Database Query Acceleration.- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks.- K2 Stream Cipher.- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.- Reliable Intersection Computation within Malicious Environments.- A Security Hardening Language Based on Aspect-Orientation.- III: SIGMAP.- Facial Expression Synthesis and Analysis.- Multi-sequence H.264/AVC Rate Control Based on the Linear Model.- Non Parametric Stochastic Expectation Maximization for Data Clustering.- Mapping Phonetic Features for Voice-Driven Sound Synthesis.- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV.- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications.- IV: WINSYS.- Design of a Password-Based EAP Method.- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels.- Mobile Applications to a Pervasive World.- Multi-service Networks: A New Approach to End-to-End Topology Management.