09:00
09:00 - 10:30 - Room Valencia Parallel Session 6 - SECRYPT
  • 7: Practical Applications of Homomorphic Encryption Michael Brenner, Henning Perl and Matthew Smith
  • 38: Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud Leyli Javid Khayati, Erkay Savaş, Berkant Ustaoğlu and Cengiz Örencik
  • 124: Secure File Allocation and Caching in Large-scale Distributed Systems Alessio Di Mauro, Alessandro Mei and Sushil Jajodia
09:00 - 10:30 - Room Sevilla Parallel Session 6 - SIGMAP
  • 33: The Effect of Multi-media Contents in Reducing Sensible Temperature Shuhei Yamamoto, Akira Tomono and Hajime Katsuyama
  • 34: Image Presentation with Smell for Digital Signage and the Effect on Eye Catching Keisuke Tomono, Hajime Katsuyama, Shuhei Yamamoto and Akira Tomono
  • 42: Architectural Model for Visualization of High Definition Images on Mobile Devices Germán Corredor, Daniel Martínez, Eduardo Romero and Marcela Iregui
  • 77: Content Meets Semantics: Smarter Exploration of Image Collections - Presentation of Relevant Use Cases Ilaria Bartolini
10:30 Coffee-Break (10:30 - 10:45)
10:45
10:45 - 12:15 - Room Dali Parallel Session 7 - OPTICS
  • 10: Channel-encoded and SVD-assisted MIMO Multimode Transmission Schemes with Iterative Detection Sebastian Aust, Andreas Ahrens and Steffen Lochmann
  • 13: High Repetition Frequency Mode-locked Semiconductor Disk Laser Yanrong Song, Peng Zhang, Jinrong Tian, Zhigang Zhang, Hark Hoe Tan and C. Jagadish
10:45 - 12:15 - Room Valencia Parallel Session 7 - SECRYPT
  • 20: Identity-based Password-Authenticated Key Exchange for Client/Server Model Xun Yi, Raylin Tso and Eiji Okamoto
  • 42: SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics Anup Kr. Bhattacharya, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur and Aravind Iyer
  • 128: Formal Analysis of the TLS Handshake Protocol Hanane Houmani and Mourad Debbabi
10:45 - 12:15 - Room Sevilla Parallel Session 7 - SIGMAP
  • 59: Keywords-based Automatic Multimedia Authoring in the Cloud Abdelkader Outtagarts, Sylvain Squedin and Olivier Martimot
  • 56: Autonomous Constructing Everyday Projected Displays Cui Xie, Qi Wang and Wei Cheng
  • 79: Next Generation TV through Automatic Multimedia Annotation Systems - A Hybrid Approach Joël Dumoulin, Marco Bertini, Alberto Del Bimbo, Elena Mugellini, Omar Abou Khaled and Maria Sokhn
  • 85: A New Tool for the Analysis of Heart Rate Variability of Long Duration Records Ricardo Chorão, Joana Sousa, Tiago Araújo and Hugo Gamboa
12:15
12:15 - 13:15 - Room Plenary ON KNOWLEDGE DISCOVERY AND INTERACTIVE INTELLIGENT VISUALIZATION OF BIOMEDICAL DATA - Challenges in Human–Computer Interaction & Biomedical Informatics Keynote Speaker: Andreas Holzinger
13:15 Lunch (13:15 - 14:30)
14:30
14:30 - 16:30 - Room Dali Parallel Session 8 - ICE-B
  • 8: Three Dimensional Elements for Sustainable e-Business Modelling Mohammed Naim A. Dewan, Maruf Hossan Chowdhury and Mohammed A. Quaddus
  • 44: Evaluating Disseminators for Time-critical Information Diffusion on Social Networks Yung-Ming Li and Lien-Fa Lin
  • 27: A Framework for Performance Measurement in Service Oriented Virtual Organizations - A Value Network Approach to Collaborative Performance Measurement S. M. Amin Kamali, Greg Richards, Mohammad H. Danesh and Bijan Raahemi
  • 33: Identifying Emerging Technologies in the e-Business Industry - A Needs-driven Approach Kyungpyo Lee, Youngkeun Song and Sungjoo Lee
  • 58: Local Governments and Cloud Computing Security Inita Kindzule, Edzus Zeiris and Maris Ziema
14:30 - 16:30 - Room Valencia Parallel Session 8 - SECRYPT
  • 15: Improved “Partial Sums”-based Square Attack on AES Michael Tunstall
  • 18: Two Dragons - A Family of Fast Word-based Stream Ciphers Matt Henricksen
  • 34: Quantitative Assessment of Cloud Security Level Agreements - A Case Study Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva and Neeraj Suri
  • 74: On Securing Communication from Profilers Sandra Díaz-Santiago and Debrup Chakraborty
14:30 - 16:30 - Room Velazquez Parallel Session 8a - SECRYPT
  • 112: Secure and Seamless Session Management in Mobile and Heterogeneous Environment Ali Hammami and Noëmie Simoni
  • 113: A Collaborative Firewall for Wireless Ad-Hoc Social Networks Leonardo Maccari
  • 130: Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer Apostolos P. Fournaris
  • 131: Improving Cloud Survivability through Dependency based Virtual Machine Placement Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu and Xubin He
  • 132: PPiTTA - Preserving Privacy in TV Targeted Advertising Tzachy Reinman and Erez Waisbard
  • 140: Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm Deepthi N. Ratnayake, Hassan B. Kazemian and Syed A. Yusuf
14:30 - 16:30 - Room Sevilla Parallel Session 8 - SIGMAP
  • 13: Fast Algorithm of Short-time DCT for Low Resolution Signal Processing Vitaly Kober
  • 38: Sphere Decoding Complexity Reduction using an Adaptive SD-OSIC Algorithm Bora Kim, Sangmi Moon, Saransh Malik, Cheolhong Kim and Intae Hwang
  • 46: Finding a Tradeoff between Compression and Loss in Motion Compensated Video Coding Thomas Guthier, Adrian Sosic, Volker Willert and Julian Eggert
  • 54: New Two-step Motion Estimation using Adjustable Partial Distortion Search - Advanced Selected Search Point and Early Termination for Two Step Motion Search Yonghoon Kim and Jechang Jeong
  • 55: Video Foreground/Background Segmentation using Spatially Distributed Model and Edge-based Shadow Cancellation Shian-De Tsai, Jin-Jang Leou and Han-Hui Hsiao
  • 61: Raw Camera Image Demosaicing using Finite Impulse Response Filtering on Commodity GPU Hardware using CUDA Patrik Goorts, Sammy Rogmans and Philippe Bekaert
  • 62: A Dataflow Description Of ACC-JPEG Codec Khaled Jerbi, Tarek Ouni and Mohamed Abid
16:30 Coffee-Break (16:30 - 16:45)
16:30
16:30 - 17:30 - Foyer Posters Session 2
ICE-B
  • 3: Analysing E-Business Applications with Business Provenance Sergio Manuel Serra da Cruz, Laci Mary Manhães, Raimundo Costa and Jorge Zavaleta
  • 6: IS Employees’ Stress and Outcomes at Work Huichih Wang, Sheng-Jim Fan and Her-Sen Doong
  • 10: A STUDY ON OLDER ADULT STUDENTS’ BEHAVIOURAL INTENTION AND LEARNING SATISFACTION OF BLENDED E-LEARNING COURSE AT THE ACTIVE AGING UNIVERSITY Horng-Jyh Chen, Chien-Jen Liu, Chien-Liang Lin, Yi-Fang Chen and Hung-Liang Chen
  • 13: Factors that Influence e-Business Application in Tertiary Education Andreas Ahrens, Sebastian Aust and Jeļena Zaščerinska
SECRYPT
  • 22: lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks Anna Sojka and Krzysztof Piotrowski
  • 68: Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients Rainer Schick and Christoph Ruland
  • 106: Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems Denis Efremov and Nikolay Pakulin
  • 120: Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol Martin Schütte, Thomas Scheffler and Bettina Schnor
  • 153: Adaptive Speech Watermarking in Wavelet Domain based on Logarithm Mehdi Fallahpour, David Megias and Hossein Najaf-Zadeh
  • 163: An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management Julien Bringer, Hervé Chabanne and Alain Patey
  • 164: A Novel Fuzzy Vault Scheme for Secret Key Exchange Lin You and Jie Lu
  • 173: HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots Patrice Clemente, Jean-Francois Lalande and Jonathan Rouzaud-Cornabas
  • 174: A Proposed Framework for Analysing Security Ceremonies Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price and Ricardo Felipe Custódio
SIGMAP
  • 8: Complexity Analysis of Video Frames by Corresponding Audio Features SeungHo Shin and TaeYong Kim
  • 12: Design of Short Irregular LDPC Codes for a Markov-modulated Gaussian Channel W. Proß, M. Otesteanu and F. Quint
  • 40: Enhancing Photoware in the Social Networks Environment Ombretta Gaggi
  • 51: Search Range Adjustment and Motion Vector Prediction for Fast Motion Estimation - Using Neighbouring Motion Vectors and Distortions for Adjustment of a Search Range and a Starting Point Do-Kyung Lee and Je-Chang Jeong
  • 65: Friction Sources Characterization for Fricative Consonants of Arabic Fazia Karaoui and Amar Djéradi