08:30 |
Welcome Desk & Registration (08:30 - 18:30)
|
09:30 |
|
09:45 |
|
11:15 |
Coffee-Break (11:15 - 12:00)
|
11:15 |
SECRYPT
-
9:
An Efficient Lightweight Security Algorithm for Random Linear Network Coding
Hassan Noura, Steven Martin and Khaldoun Al Agha
-
23:
Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine
Adriana-Cristina Enache and Valentin Sgârciu
-
51:
On Privacy Protection in the Internet Surveillance Era
Dijana Vukovic, Danilo Gligoroski and Zoran Djuric
-
53:
Framework for Securing Data in Cloud Storage Services
Mai Dahshan and Sherif Elkassas
-
91:
Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA
Shizra Sultan, Abdul Ghafoor Abbasi, Awais Shibli and Ali Nasir
-
96:
A Cryptographic Study of Tokenization Systems
Sandra Díaz-Santiago, Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
-
98:
Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon
Nicolas Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad and Petr Susil
-
114:
Software and Hardware Certification Techniques in a Combined Certification Model
Antonio Muñoz and Antonio Maña
-
117:
Experimental
Study of Performance and Security Constraints on Wireless Key
Distribution Using Random Phase of Multipath Radio Signal
Amir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov and Oleg N. Sherstyukov
-
118:
Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper
Daniel Kavan, Klára Škodová and Martin Klíma
-
119:
Could Bitcoin Transactions Be 100x Faster?
Nicolas T. Courtois, Pinar Emirdag and Daniel A. Nagy
-
121:
Using Bitmaps for Executing Range Queries in Encrypted Databases
Lil María Rodríguez-Henríquez and Debrup Chakraborty
-
122:
Differential Fault Attacks against AES Tampering with the Instruction Flow
Silvia Mella, Filippo Melzani and Andrea Visconti
-
126:
COGITO: Code Polymorphism to Secure Devices
Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon and Philippe Lalevée
-
137:
QR Steganography - A Threat to New Generation Electronic Voting Systems
Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas and Víctor Acín
OPTICS
-
13:
Receiver Design for an Optical MIMO Testbed
Heidi Köhnke, Robert Schwinkendorf, Sebastian Daase, Andreas Ahrens and Steffen Lochmann
-
17:
Research of Cable Identification Method Based on Single Fiber
Qiang Sun and Qifu Wu
-
22:
Delay-Aware Dynamic Wavelength Bandwidth Allocation in Time- and Wavelength-Division-Multiplexed Passive Optical Network
Junsu Kim, Yong-Kyu Choi, Han Hyub Lee and Chang-Soo Park
-
26:
Mid-Infrared Supercontinuum Generation in an AsSe2-As2S5 Hybrid Microstructured Optical Fiber
Tonglei
Cheng, Yasuhire Kanou, Dinghuan Deng, Xiaojie Xue, Morio Matsumoto,
Takashi Misumi, Takenobu Suzuki and Yasutake Ohishi
SIGMAP
-
18:
Methods and Algorithms of Cluster Analysis in the Mining Industry - Solution of Tasks for Mineral Rocks Recognition
Olga Baklanova and Olga Ya Shvets
-
23:
Hierarchical
Optimization Using Hierarchical Multi-competitive Genetic Algorithm and
its Application to Multiple Vehicle Routing Problem
Shudai Ishikawa, Ryosuke Kubota and Keiichi Horio
-
44:
Auditory Features Analysis for BIC-based Audio Segmentation
Tomasz Maka
-
59:
Voice Morphing Based on Spectral Features and Prosodic Modification
Abdul Qavi, Shoab Ahmed Khan and Kashif Basir
-
66:
Image Denoising Algorithm with a Three-dimensional Grid System of Coupled Nonlinear Elements
Atsushi Nomura, Yoshiki Mizukami and Koichi Okada
-
70:
Smoothed Surface Transitions for Human Motion Synthesis
Ashish Doshi
|
12:15 |
-
14:
Equalisation of Measured Optical MIMO Channels
André Sandmann, Andreas Ahrens and Steffen Lochmann
-
18:
On the Impact of the Clipping Techniques on the Performance of Optical OFDM
João Guerreiro, Rui Dinis and Paulo Montezuma
-
23:
Decision Support and Online Advertising - Development and Empirical Testing of a Data Landscape
Thomas Hansmann and Florian Nottorf
-
30:
A Resource-aware Simulation Tool for Business Processes
Vincenzo Cartelli, Giuseppe Di Modica and Orazio Tomarchio
-
21:
Assessing the Cooperativeness of Users in Wi-Fi Networks
Szymon Szott, Grzegorz Ptaszek and Lucjan Janowski
-
22:
Impact of the IEEE 802.11aa Intra-AC Prioritization on QoE for H.264 Compression
Katarzyna Kosek-Szott, Marek Natkaniec, Lukasz Prasnal and Lucjan Janowski
-
23:
Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations
Imen El Bouabidi, Salima Smaoui, Faouzi Zarai, Mohammad S. Obaidat and Lotfi Kamoun
-
16:
A Multi-Threaded Full-feature HEVC Encoder Based on Wavefront Parallel Processing
Stefan Radicke, Jens-Uwe Hahn, Christos Grecos and Qi Wang
-
57:
Visual Attention in Edited Dynamical Images
Ulrich Ansorge, Shelley Buchinger, Christian Valuch, Aniello Raffaele Patrone and Otmar Scherzer
-
69:
A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme
Francesco Buccafurri and Gianluca Lax
-
86:
Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization
Pratik Poddar, Achin Bansal and Bernard Menezes
-
90:
Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers
Frederik Armknecht and Vasily Mikhalev
-
3:
MOSAIC - Multimodal Analytics for the Protection of Critical Assets
Atta Badii,
Marco Tiemann, Richard Adderley, Patrick Seidler, Rubén Heras Evangelio,
Tobias Senst, Thomas Sikora, Luca Panattoni, Matteo Raffaelli, Matthew
Cappel-Porter, Zsolt L. Husz, Thomas Hecker and Ines Peters
-
6:
Multimedia Analysis of Video Sources
Juan Arraiza Irujo, Montse Cuadros, Naiara Aginako, Matteo Raffaelli, Olga Kaehm, Naser Damer and Joao P. Neto
|
13:15 |
Lunch (13:15 - 14:30)
|
14:30 |
-
3:
Routing Strategy of a Prioritized Limited Multi-Server Processor-Sharing System
Yoshiaki Shikata and Nobutane Hanayama
-
8:
AVP - An Android Virtual Playground
François Gagnon, Frédéric Lafrance, Simon Frenette and Simon Hallé
-
9:
Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering
Petr Matoušek, Ondřej Ryšavý, Matěj Grégr and Martin Vymlátil
-
13:
Papers, Please... - X.509 Certificate Revocation in Practice
Manuel Koschuch and Ronald Wagner
-
18:
A SCTP-based Authentication Protocol: SCTPAP
Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat and K. F. Hsiao
-
21:
Pricing and Competition in Mobile App Markets
Ning-Yao Pai and Yung-Ming Li
-
22:
QoS based Resource Allocation and Service Selection in the Cloud
Rima Grati, Khouloud Boukadi and Hanêne Ben-Abdallah
-
21:
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions
Paulo Shakarian, Damon Paulo, Massimiliano Albanese and Sushil Jajodia
-
24:
Certificateless Non-Interactive Key Exchange Protocol without Pairings
Yun Wei, Fushan Wei and Chuangui Ma
-
71:
Formal Analysis of Electronic Exams
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini and Peter Y. A. Ryan
-
72:
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino and Neeraj Suri
-
39:
Self-calibration of Large Scale Camera Networks
Patrik Goorts, Steven Maesen, Yunjun Liu, Maarten Dumont, Philippe Bekaert and Gauthier Lafruit
-
47:
Noise Mitigation over Powerline Communication Using LDPC-Convolutional Code and Fusion of Mean and Median Filters
Yassine Himeur and Abdelkrim Boukabou
-
53:
Evaluation of Acoustic Feedback Cancellation Methods with Multiple Feedback Paths
Bruno Bispo and Diamantino Freitas
-
29:
Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction
Vandana Guleria and Ratna Dutta
-
35:
A Secure Anonymous Proxy Multi-signature Scheme
Vishal Saraswat and Rajeev Anand Sahu
-
76:
Privacy Preserving Delegated Word Search in the Cloud
Kaoutar Elkhiyaoui, Melek Önen and Refik Molva
-
66:
KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited
Jinyong Chang and Rui Xue
-
5:
A Multi-configuration Part-based Person Detector
Alvaro Garcia-Martin, Ruben Heras Evangelio and Thomas Sikora
-
7:
GIS-supported People Tracking Re-acquisition in a Multi-camera Environment
Anastasios Dimou, Vasileios Lovatsis, Andreas Papadakis, Stelios Pantelopoulos and Petros Daras
-
4:
Data Integration, Semantic Data Representation and Decision Support for Situational Awareness in Protection of Critical Assets
Atta Badii, Marco Tiemann and Daniel Thiemert
|
16:30 |
ICE-B
-
4:
The Method
of Automated Monitoring of Product Prices and Market Position
Determination in Relation to Competition Quotes - Monitoring of Product
Prices and Marketability Development with Continuous Assessment of
Market Position in on-Line Sales
Radoslav Fasuga, Pavel Stoklasa and Martin Němec
-
6:
A Comparative Study of Engineering and Business Students’ Attitude to e-Business Application
Andreas Ahrens and Jeļena Zaščerinska
-
7:
A Framework for Selecting Sample Size in Educational Research on e-business Application
Andreas Ahrens and Jelena Zaščerinska
-
25:
Proposed Business Model for SME Farmers in Peri-Urban Sydney Region
Ana Hol, Omar Mubin and Athula Ginige
-
32:
Electronic Internal Marketing for Tourism - A New Tourism Marketing Approach
Shohei Suzuki and Shoichi Morimoto
-
33:
e-Shop User Preferences via User Behavior
Peter Vojtáš and Ladislav Peška
-
41:
Usage of Semantic Transformations in B2B Integration Solutions
Leonid Shumsky, Pavel Shapkin and Viacheslav Wolfengagen
-
42:
Automatic Business Process Model Assembly on the Basis of Subject-Oriented Semantic Process Mark-up
Alexander Gromoff, Nikolay Kazantsev, Pavel Shapkin and Leonid Shumsky
-
45:
A Research on Inflation Expectations Measurements and Applications - A View Based on Network Behavior
Yi Sun, Benfu Lv and Tian Xue
-
46:
Literature
Review and an Analysis of the State of the Market of Anything
Relationship Management (xRM) - xRM as an Extension of Customer
Relationship Management
Jonathan P. Knoblauch and Rebecca Bulander
SECRYPT
-
7:
A Formal Model for Forensic Storage Media Preparation Tools
Benjamin Aziz, Philippe Massonet and Christophe Ponsard
-
22:
A Steganographic Protocol Based on Linear Error-Block Codes
Rabiî Dariti and El Mamoun Souidi
-
45:
Hybrid-Style Personal Key Management in Ubiquitous Computing
Byoungcheon Lee
-
57:
Partial Fingerprint Identification Through Correlation-Based Approach
Omid Zanganeh, Nandita Bhattacharjee and Bala Srinivasan
-
125:
Secure Key Distribution based on Meteor Burst Communications
Amir Sulimov and Arkadij Karpov
-
129:
Using Abductive and Inductive Inference to Generate Policy Explanations
Fabio Marfia
-
130:
Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud
Maherzia Belaazi, Hanen Boussi Rahmouni and Adel Bouhoula
-
131:
Pseudorandom Number Generators with Balanced Gray Codes
J.-F. Couchot, P.-C. Heam, C. Guyeux, Q. Wang and J. M. Bahi
-
133:
Keeping an Eye on Your Security Through Assurance Indicators
Moussa Ouedraogo, Chien-Ting Kuo , Simon Tjoa, David Preston, Eric Dubois, Paulo Simoes and Tiago Cruz
-
141:
RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies
Mikko Kiviharju
SIGMAP
-
8:
Computational Complexity Analysis of the Graph Extraction Algorithm for Volumetric Segmentation Method
Dumitru Dan Burdescu, Liana Stanescu, Marius Brezovan and Cosmin Stoica Spahiu
-
12:
Real-time Super Resolution Equipment for 8K Video
Seiichi Gohshi
-
27:
Home Position Recognition Methods Using Polarizing Films for an Eye-gaze Interface System
Kohichi Ogata, Kensuke Sakamoto and Shingo Niino
-
35:
Protecting Digital Fingerprint in Automated Fingerprint Identification System using Local Binary Pattern Operator
Ait Sadi Karima, Bouchair Imène , K. Zebbiche and Moussadek Laadjel
-
41:
Image Enhancement for Hand Sign Detection
Jing-Wein Wang, Tzu-Hsiung Chen and Tsong-Yi Chen
-
69:
Towards a Wake-up and Synchronization Mechanism for Multiscreen Applications using iBeacon
Louay Bassbouss, Görkem Güçlü and Stephan Steglich
DCNET
-
12:
Remote Laboratory for Computer Networks
Ladislav Balik, Josef Horalek, Vladimir Sobeslav and Ondrej Hornig
-
15:
The Bio-Inspired and Social Evolution of Node and Data in a Multilayer Network
Marialisa Scatà, Alessandro Di Stefano, Evelina Giacchi, Aurelio La Corte and Pietro Liò
|
16:30 |
Coffee-Break (16:30 - 17:15)
|
17:30 |
|
18:30 |
Welcome Drink (18:30 - 19:00)
|