DCNET |
4 |
20 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
DCNET - International Conference on Data Communication Networking |
M102 |
Evaluation of Video Transmission in Emergency Response Ad Hoc Networks |
DCNET |
6 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
DCNET - International Conference on Data Communication Networking |
Sólin |
A Novel Technique for TCP Based Congestion Control |
DCNET |
7 |
30 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
DCNET - International Conference on Data Communication Networking |
M102 |
Some Synchronization Issues in OSPF Routing |
DCNET |
8 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
DCNET - International Conference on Data Communication Networking |
M209 |
Resource-aware Virtualization for Industrial Networks - A Novel Architecture Combining Resource Management, Policy Control and Network Virtualization for Networks in Automation or Supervisory Control and Data Acquisition Networks |
DCNET |
9 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
DCNET - International Conference on Data Communication Networking |
M209 |
Token-based Authentication for Smartphones - Position Paper |
DCNET |
12 |
30 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
DCNET - International Conference on Data Communication Networking |
M102 |
HyVVE - A Voronoi based Hybrid Architecture for Massively Multiplayer On-line Games |
DCNET |
14 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
DCNET - International Conference on Data Communication Networking |
M209 |
A New Approach for Detection of Host Identity in IPv6 Networks |
DCNET |
17 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
DCNET - International Conference on Data Communication Networking |
Sólin |
Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions - Position Paper |
ICE-B |
6 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Applications |
Sólin |
Accommodating Individual Differences in Web based Instruction (WBI) and Implementation |
ICE-B |
7 |
30 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
Mobility |
M208 |
Integrating User-centred Design in an Early Stage of Mobile Medical Application Prototyping - A Case Study on Data Acquistion in Health Organisations |
ICE-B |
8 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Applications |
Sólin |
e-Business Application to Students""'' Blended Learning in Higher Education |
ICE-B |
10 |
20 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
Sustainable e-Business |
M209 |
Electronic Human Resource Management Strategies for Atypical Employment |
ICE-B |
11 |
30 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Sustainable e-Business |
M209 |
Determinants of Use Intensity in Social Networking Sites - A Cross-cultural Study of Korea and USA |
ICE-B |
13 |
30 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Applications |
M209 |
Strategic use of Twitter in Local Government - A Northern Ireland Study |
ICE-B |
18 |
20 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Applications |
M209 |
The Trust in Online Discussion Forums and How they Influence Patients' Intention to Adopt Medical Tourism Services |
ICE-B |
19 |
30 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Enterprise Engineering |
M209 |
Which Clicks Lead to Conversions? - Modeling User-journeys Across Multiple Types of Online Advertising |
ICE-B |
20 |
30 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
Technology Platforms |
M208 |
RestContext - A Service Framework for Context Retrieval |
ICE-B |
21 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Applications |
Sólin |
A Proposed Framework for Supporting Behaviour Change by Translating Personalised Activities into Measurable Benefits |
ICE-B |
22 |
30 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Mobility |
M209 |
Virtual Currency for Online Platforms - Business Model Implications |
ICE-B |
24 |
30 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
e-Logistics |
M209 |
An Interactive Evaluation Method of Decentralized Procurement Plan by Multi-Objective Genetic Algorithm |
ICE-B |
26 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
e-Logistics |
Sólin |
RFID based Data Mining for E-logistics |
ICE-B |
27 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
Technology Platforms |
M208 |
Data Model and Data Access Control Method on Service Platform for Smart Public Infrastructure |
ICE-B |
30 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Enterprise Engineering |
Sólin |
The e-Visibility Maturity Model - Assessing Stages of Visibility Evolution for e-Business |
ICE-B |
31 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Applications |
Sólin |
Applying Bayesian Parameter Estimation to A/B Tests in e-Business Applications - Examining the Impact of Green Marketing Signals in Sponsored Search Advertising |
ICE-B |
32 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
Applications |
Sólin |
The Influence of Virtualization of Resources Acquisition Processes on the Enterprises Competitiveness |
ICE-B |
33 |
20 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
e-Logistics |
M209 |
A Distributed CTL Model Checker |
ICE-B |
34 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Applications |
Sólin |
A Comparative Prediction Study of Housing Price Index based on Web Search Data - Evidence from Beijing and Lanzhou in China |
ICE-B |
35 |
20 min |
Tuesday 30 |
Session 3B |
10:45 - 12:15 |
Mobility |
M208 |
Marketing and Fundraising through Mobile Phones - New Strategies for Non Profit Organizations and Charities |
ICE-B |
36 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Collaboration and e-Services |
Sólin |
EFilter: An Efficient Filter for Supporting Twig Query Patterns in XML Streams |
ICE-B |
37 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Applications |
Sólin |
A Study on Construction of Inflation Index based on Web Search Data
|
ICE-B |
38 |
30 min |
Tuesday 30 |
Session 3B |
10:45 - 12:15 |
Applications |
M208 |
Emerging Trends in Local Governments Web Strategies - Citizen Web Empowerment Assessment in Italy |
ICE-B |
40 |
20 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
Applications |
M209 |
Continuous Improvement of Geographic Data Production Processes - Approach and Results of a Case Study |
ICE-B |
41 |
30 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Enterprise Engineering |
M209 |
From e-Supply Chain Capability Generation to Information Technology Value Co-creation - A Perspective of e-Business Process |
ICE-B |
42 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
Collaboration and e-Services |
Sólin |
The Concept of Building Regional Business Spatial Community |
ICE-B |
44 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Enterprise Engineering |
Sólin |
The Consideration of Organizational, Human and Corporate Cultural Factors in the Implementation of Business Process Management Projects - Social Factors to Prevent Failure of BPM Projects |
ICE-B |
45 |
30 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Applications |
M209 |
Estimating the Effort in the Development of Distance Learning Paths |
ICE-B |
47 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
Collaboration and e-Services |
Sólin |
Proposed Use of Sharepoint to Improve New Employee In-processing |
ICE-B |
53 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Applications |
Sólin |
Qsense - Learning Semantic Web Concepts by Querying DBpedia |
ICE-B |
54 |
20 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
Collaboration and e-Services |
M209 |
Continuous Information Provisioning for the Conference Participation Process |
ICE-B |
55 |
30 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
Applications |
M208 |
The Development of ``BAU GIS'' Web/Program using Open Source MapWindow |
ICE-B |
56 |
20 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
Collaboration and e-Services |
M209 |
Increase of Travel Safety for Public Transport by Mobile Applications |
OPTICS |
2 |
30 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
M102 |
Dispersion Analysis within a Measured 1,4 km MIMO Multimode Channel |
OPTICS |
3 |
30 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
M102 |
Optical Couplers in Multimode MIMO Transmission Systems - Measurement Results and Performance Analysis |
OPTICS |
10 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
OPTICS - International Conference on Optical Communication Systems |
Sólin |
Optical Parametric Gain of Tellutire/Phosphate Highly Nonlinear Optical Fiber |
OPTICS |
11 |
20 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
M102 |
Experimental Distribution of OFDM-UWB Radio Signals along Directly Modulated Long-reach Pons Indicated for Sparse Geographical Areas |
SECRYPT |
8 |
30 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
InCC: Hiding Information By Mimicking Traffic In Network Flows |
SECRYPT |
10 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis |
SECRYPT |
13 |
30 min |
Monday 29 |
Session 1B |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves |
SECRYPT |
16 |
30 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Improving Block Cipher Design by Rearranging Internal Operations |
SECRYPT |
19 |
20 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks |
SECRYPT |
22 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
On the Connection between t-Closeness and Differential Privacy for Data Releases |
SECRYPT |
23 |
30 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
A Security-enhanced Design Methodology for Embedded Systems |
SECRYPT |
26 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
AVON - A Fast Hash Function for Intel SIMD Architectures |
SECRYPT |
29 |
20 min |
Wednesday 31 |
Session 6B |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme |
SECRYPT |
30 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
LMM - A Common Component for Software License Management on Cloud |
SECRYPT |
31 |
20 min |
Tuesday 30 |
Session 4B |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Dynamic Proofs of Retrievability from Chameleon-Hashes |
SECRYPT |
32 |
30 min |
Tuesday 30 |
Session 2B |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
A Key-revocable Attribute-based Encryption for Mobile Cloud Environments |
SECRYPT |
33 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers |
SECRYPT |
35 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs |
SECRYPT |
38 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Redactable Signature Scheme for Tree-structured Data based on Merkle Tree |
SECRYPT |
40 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
SVD-based Digital Image Watermarking on approximated Orthogonal Matrix |
SECRYPT |
42 |
30 min |
Tuesday 30 |
Session 2B |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control |
SECRYPT |
46 |
20 min |
Wednesday 31 |
Session 6A |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Massive Group Message Authentication with Revocable Anonymity |
SECRYPT |
47 |
20 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction |
SECRYPT |
49 |
30 min |
Tuesday 30 |
Session 3B |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software |
SECRYPT |
51 |
20 min |
Wednesday 31 |
Session 5B |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones |
SECRYPT |
58 |
30 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
HoneydV6: A Low-interaction IPv6 Honeypot |
SECRYPT |
59 |
20 min |
Wednesday 31 |
Session 5B |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components |
SECRYPT |
60 |
30 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Which Side Are You On? - A New Panopticon vs. Privacy |
SECRYPT |
61 |
30 min |
Tuesday 30 |
Session 3B |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL |
SECRYPT |
63 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Are BiometricWeb Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks |
SECRYPT |
64 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks |
SECRYPT |
66 |
30 min |
Tuesday 30 |
Session 3B |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks |
SECRYPT |
67 |
30 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Towards Cryptographic Function Distinguishers with Evolutionary Circuits |
SECRYPT |
68 |
20 min |
Wednesday 31 |
Session 6B |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Preimage Attack on BioHashing |
SECRYPT |
69 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication |
SECRYPT |
75 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles |
SECRYPT |
76 |
30 min |
Tuesday 30 |
Session 2B |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control |
SECRYPT |
77 |
30 min |
Monday 29 |
Session 1B |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Secure Second Price Auctions with a Rational Auctioneer |
SECRYPT |
78 |
30 min |
Monday 29 |
Session 1B |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments |
SECRYPT |
79 |
20 min |
Tuesday 30 |
Session 4B |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
An Efficient and Provably Secure Certificateless Identification Scheme |
SECRYPT |
80 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Identity Security in Biometric Systems based on Keystroking |
SECRYPT |
81 |
30 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data |
SECRYPT |
87 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications |
SECRYPT |
88 |
30 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Behavior-based Malware Analysis using Profile Hidden Markov Models |
SECRYPT |
92 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Related-key Impossible Differential Cryptanalysis of Full-round HIGHT |
SECRYPT |
93 |
20 min |
Tuesday 30 |
Session 4B |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting |
SECRYPT |
95 |
20 min |
Wednesday 31 |
Session 5B |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Instance-based Anomaly Method for Android Malware Detection |
SECRYPT |
96 |
20 min |
Tuesday 30 |
Session 4B |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities |
SECRYPT |
98 |
20 min |
Wednesday 31 |
Session 6B |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs |
SECRYPT |
102 |
30 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities |
SECRYPT |
103 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks |
SECRYPT |
107 |
30 min |
Tuesday 30 |
Session 4B |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Secure Alert Tracking in Supply Chain |
SECRYPT |
110 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Enhanced Truncated Differential Cryptanalysis of GOST |
SECRYPT |
111 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Privacy-enhanced Perceptual Hashing of Audio Data |
SECRYPT |
112 |
30 min |
Tuesday 30 |
Session 3A |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model |
SECRYPT |
116 |
20 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Privacy-preserving Realization of the STORK Framework in the Public Cloud |
SECRYPT |
117 |
30 min |
Monday 29 |
Session 1B |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Secure Computation of Hidden Markov Models |
SECRYPT |
119 |
20 min |
Wednesday 31 |
Session 6B |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
The Usability of CAPTCHAs on Smartphones |
SECRYPT |
120 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
From a Logical Approach to Internal States of Hash Functions |
SECRYPT |
122 |
20 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE |
SECRYPT |
127 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Recovering RSA Private Keys on Implementations with Tampered LSBs |
SECRYPT |
128 |
20 min |
Wednesday 31 |
Session 5B |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
V201 |
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices |
SECRYPT |
131 |
30 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
M201 |
Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing |
SECRYPT |
137 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration |
SECRYPT |
138 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Public-key Cryptography from Different Assumptions - A Multi-bit Version |
SECRYPT |
139 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs |
SECRYPT |
140 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Approaching Encryption through Complex Number Logarithms |
SECRYPT |
141 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Keystroke Authentication with a Capacitive Display using Different Mobile Devices |
SECRYPT |
151 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
MINHO - A Novel Authentication Scheme based on Pre-Authentication Service |
SECRYPT |
157 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
A Model-driven Approach for Securing Software Architectures |
SECRYPT |
162 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
Database Anomalous Activities - Detection and Quantification |
SECRYPT |
163 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
A Preliminary Application of Generalized Fault Trees to Security |
SECRYPT |
164 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Sólin |
E3SN - Efficient Security Scheme for Sensor Networks |
SIGMAP |
8 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Multimedia Signal Processing |
Sólin |
Simplified Computation of l2-Sensitivity for 1-D and a Class of 2-D State-Space Digital Filters Considering 0 and +-1 Elements |
SIGMAP |
12 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Multimedia Systems and Applications |
Sólin |
A Parity-based Error Control Method for Distributed Compressive Video Sensing |
SIGMAP |
13 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Multimedia Systems and Applications |
Sólin |
REENACT: Augmented Reality and Collective Role Playing to Enhance the Pedagogy of Historical Events - An EXPERIMEDIA Experiment |
SIGMAP |
16 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Multimedia Signal Processing |
Sólin |
Length of Phonemes in a Context of their Positions in Polish Sentences |
SIGMAP |
18 |
20 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Multimedia Systems and Applications |
M208 |
Multi-Point Measurement System and Data Processing for Earthquakes Monitoring |
SIGMAP |
23 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Multimedia Signal Processing |
Sólin |
A TV Commercial Retrieval System based on Audio Features |
SIGMAP |
25 |
20 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Multimedia Signal Processing |
M208 |
Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image |
SIGMAP |
27 |
30 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Multimedia and Communications |
M208 |
Optimization of Free Viewpoint Interpolation by Applying Adaptive Depth Plane Distributions in Plane Sweeping - A Histogram-based Approach to a Non-uniform Plane Distribution |
SIGMAP |
29 |
20 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Multimedia Systems and Applications |
M208 |
A Linearvibrotactile Actuator for Mobile Devices |
SIGMAP |
30 |
30 min |
Tuesday 30 |
Session 4A |
14:30 - 16:30 |
Multimedia Signal Processing |
M208 |
Improving the Performance of Speaker Verification Systems under Noisy Conditions using Low Level Features and Score Level Fusion |
SIGMAP |
32 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Multimedia Systems and Applications |
Sólin |
Fully Automatic Saliency-based Subjects Extraction in Digital Images |
SIGMAP |
33 |
30 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Multimedia Signal Processing |
M208 |
Multi-modal Bike Sensing for Automatic Geo-annotation - Geo-annotation of Road/Terrain Type by Participatory Bike-sensing |
SIGMAP |
34 |
Poster |
Monday 29 |
Poster Session 1 |
11:00 - 12:00 |
Multimedia Systems and Applications |
Sólin |
Markerless Augmented Reality based on Local Binary Pattern |
SIGMAP |
39 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
Multimedia Systems and Applications |
M208 |
Automatic Attendance Rating of Movie Content using Bag of Audio Words Representation |
SIGMAP |
40 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
Multimedia Systems and Applications |
M208 |
Towards Live Subtitling of TV Ice-hockey Commentary |
SIGMAP |
43 |
20 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Multimedia Systems and Applications |
M208 |
SignalBIT - A Web-based Platform for Real-time Biosignal Visualization and Recording |
SIGMAP |
44 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
Multimedia Systems and Applications |
M208 |
A Data Cube Model for Surveillance Video Indexing and Retrieval |
SIGMAP |
45 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
Multimedia Signal Processing |
Sólin |
An Unsupervised Ensemble-based Markov Random Field Approach to Microscope Cell Image Segmentation |
SIGMAP |
46 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
Multimedia and Communications |
Sólin |
SAO Filtering inside CTU Loop for High Efficiency Video Coding |
SIGMAP |
47 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Multimedia and Communications |
Sólin |
Design Approaches for Mode Decision in HEVC Encoder - Exploiting Parallelism at CTB Level |
WINSYS |
2 |
30 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
M208 |
Reliability Analysis of IEEE 802.11p Wireless Communication and Vehicle Safety Applications |
WINSYS |
9 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Sólin |
Moving Object Classifier based on UWB Radar Signal |
WINSYS |
10 |
20 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Sensor, Mesh and Ad Hoc Communications and Networks |
M102 |
Efficient Coupled PHY and MAC use of Physical Bursts by ARQ-Enabled Connections in IEEE 802.16e/WiMAX Networks |
WINSYS |
11 |
30 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
Wireless and Mobile Technologies |
M209 |
Modulation-mode and Power Assignment in SVD-assisted MIMO Systems with Transmitter-side Antennas Correlation |
WINSYS |
16 |
Poster |
Monday 29 |
Poster Session 2 |
16:15 - 17:15 |
Mobile Software and Services |
Sólin |
Tool Support for Building Graph Construction |
WINSYS |
18 |
30 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
Wireless and Mobile Technologies |
M209 |
Capacity Analysis of Heterogeneous Wireless Networks under SINR Interference Constraints |
WINSYS |
24 |
20 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
M208 |
RealWorld Testing of Aggregation in Publish/Subscribe Systems |
WINSYS |
26 |
20 min |
Tuesday 30 |
Session 2A |
09:00 - 10:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
M208 |
VIMENO: A VirtualWireless Mesh Network Architecture for Operators |
WINSYS |
28 |
Poster |
Tuesday 30 |
Poster Session 3 |
16:30 - 17:30 |
Wireless and Mobile Technologies |
Sólin |
Prediction of Spectrum based on Improved RBF Neural Network in Cognitive Radio |
WINSYS |
32 |
20 min |
Wednesday 31 |
Session 5A |
09:00 - 10:30 |
Wireless and Mobile Technologies |
M209 |
Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks |
WINSYS |
35 |
20 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Sensor, Mesh and Ad Hoc Communications and Networks |
M102 |
Energy Aware Routing in IEEE 802.11sWireless Mesh Networks |
WINSYS |
36 |
20 min |
Monday 29 |
Session 1A |
14:15 - 16:15 |
Wireless and Mobile Technologies |
M102 |
On Providing Fair Performance in Adaptive Wireless Push Systems |