TY - BOOK AU - Filipe,Joaquim AU - Obaidat,Mohammad S. ED - SpringerLink (Online service) TI - E-business and Telecommunications: 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers T2 - Communications in Computer and Information Science, SN - 9783540886532 AV - TK5105.5-5105.9 U1 - 004.6 23 PY - 2009/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg KW - Computer science KW - Computer communication systems KW - Computer security KW - Data structures (Computer science) KW - Data encryption (Computer science) KW - Application software KW - E-commerce KW - Computer Science KW - Computer Communication Networks KW - e-Commerce/e-business KW - Systems and Data Security KW - Data Encryption KW - Computer Appl. in Administrative Data Processing KW - Data Structures, Cryptology and Information Theory N1 - Invited Speakers -- Pragmatic Computing – A Semiotic Perspective to Web Services -- Utility Computing: Reality and Beyond -- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting -- I: ICE-B -- Bidding Agents That Perpetrate Auction Fraud -- A Platform for Mobile Service Provisioning Based on SOA-Integration -- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis -- Critical Success Factors of Internet Shopping: The Case of Japan -- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains -- II: SECRYPT -- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model -- Securing Biometric Templates Where Similarity Is Measured with Set Intersection -- Score Equalization in SVM Multimodal Fusion for Person Recognition -- Remote Algorithmic Complexity Attacks against Randomized Hash Tables -- Securing Real-Time Sessions in an IMS-Based Architecture -- IPSec Database Query Acceleration -- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks -- K2 Stream Cipher -- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols -- Reliable Intersection Computation within Malicious Environments -- A Security Hardening Language Based on Aspect-Orientation -- III: SIGMAP -- Facial Expression Synthesis and Analysis -- Multi-sequence H.264/AVC Rate Control Based on the Linear Model -- Non Parametric Stochastic Expectation Maximization for Data Clustering -- Mapping Phonetic Features for Voice-Driven Sound Synthesis -- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV -- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications -- IV: WINSYS -- Design of a Password-Based EAP Method -- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels -- Mobile Applications to a Pervasive World -- Multi-service Networks: A New Approach to End-to-End Topology Management N2 - This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS UR - http://dx.doi.org/10.1007/978-3-540-88653-2 ER -