Event Paper Nr. Presentation Day Session Time Area Room Paper Title
DCNET 1 30 min Monday 20 Session 1A 14:15 - 15:45 DCNET - International Conference on Data Communication Networking G01 Towards a Real Application-aware Network
DCNET 2 30 min Monday 20 Session 1A 14:15 - 15:45 DCNET - International Conference on Data Communication Networking G01 Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility
DCNET 5 Poster Monday 20 Poster Session 1 15:45 - 16:45 DCNET - International Conference on Data Communication Networking Building K Service Forwarding Label for Network Function Virtualization and Application-centric Traffic Steering
DCNET 7 Poster Monday 20 Poster Session 1 15:45 - 16:45 DCNET - International Conference on Data Communication Networking Building K Indoor Localization of the Points of Interest using RO-SLAM
DCNET 8 Poster Monday 20 Poster Session 1 15:45 - 16:45 DCNET - International Conference on Data Communication Networking Building K Routing in Cognitive Wireless Mesh Networks - An Intelligent Framework
ICE-B 3 20 min Tuesday 21 Session 2A 10:00 - 11:30 Applications G02 Salt Seller - Realization of a Business Game
ICE-B 5 30 min Monday 20 Session 1A 14:15 - 15:45 Sustainable e-Business G02 Social Networking Sites: An Exploration of the Effect of National Cultural Dimensions on Country Adoption Rates
ICE-B 7 30 min Monday 20 Session 1A 14:15 - 15:45 Applications G02 A Business Model Approach to Local mGovernment Applications - Mapping the Brussels Region’s Mobile App Initiatives
ICE-B 9 Poster Monday 20 Poster Session 1 15:45 - 16:45 Enterprise Engineering Building K Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use
ICE-B 10 20 min Wednesday 22 Session 6A 11:00 - 12:00 Applications G02 Supporting Chinese Farmers with ICT-based Information Services - An Analysis of Service Models
ICE-B 11 Poster Monday 20 Poster Session 1 15:45 - 16:45 Applications Building K A Cloud Gaming System Design Insights
ICE-B 12 Poster Monday 20 Poster Session 1 15:45 - 16:45 Applications Building K Combining Physiological with Cognitive Measures of Online Users to Evaluate a Physicians’ Review Website
ICE-B 13 20 min Wednesday 22 Session 6A 11:00 - 12:00 Collaboration and e-Services G02 Enhancing Business Processes with Web 2.0 Features
ICE-B 16 20 min Tuesday 21 Session 4A 16:45 - 17:45 Sustainable e-Business G02 Content Control Scheme to Realize Right Succession and Edit Control
ICE-B 17 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 Sustainable e-Business Building K Sustainable Farm System for Peri-urban Sydney SMEs
ICE-B 18 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 Sustainable e-Business Building K An Intelligent Tool for All-to-All Sales on the Internet - Platform for Compilation of Commercial Offers and Requests for Companies and Customers
ICE-B 19 20 min Wednesday 22 Session 6A 11:00 - 12:00 Collaboration and e-Services G02 A Model of Effective IT Governance for Collaborative Networked Organizations
ICE-B 20 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 Enterprise Engineering Building K Measurement Framework for Business Process Outsourcing to the Cloud
ICE-B 21 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Technology Platforms Building K SOA and EDA: A Comparative Study - Similarities, Differences and Conceptual Guidelines on their Usage
ICE-B 24 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 Enterprise Engineering Building K Modelling Flexible Collaborative Process: The VCP2M Approach
ICE-B 25 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 Enterprise Engineering Building K Business Process Model Matching: An Approach based on Semantics and Structure
ICE-B 26 Poster Monday 20 Poster Session 1 15:45 - 16:45 Enterprise Engineering Building K Stakeholder Oriented Enterprise Architecture Modelling
ICE-B 27 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Applications Building K Design and Implementation of a Workflow Oriented ERP System
ICE-B 28 20 min Wednesday 22 Session 7A 14:30 - 15:30 Enterprise Engineering G02 The Impact of Digital Presence on Competitive Advantage - A Study Applied to Brazilian Bank Industry
ICE-B 29 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Technology Platforms Building K SaaS Cloud Provider Management Framework
ICE-B 31 20 min Monday 29 Session 1A 14:15 - 15:45 Enterprise Engineering G02 An Investigation of Customers’ Loyalty to Social Commerce Websites
ICE-B 33 20 min Wednesday 22 Session 7A 14:30 - 15:30 Enterprise Engineering G02 Meta-modelling the Strategic Alignment Model for Aligning Information Systems Support to Specific Application Domains
ICE-B 34 30 min Tuesday 21 Session 2A 10:00 - 11:30 e-Logistics G02 An Adaptive E-Advertising User Model: The AEADS Approach
ICE-B 37 30 min Tuesday 21 Session 4A 16:45 - 17:45 Enterprise Engineering G02 Hyred - HYbrid Job REcommenDation System
ICE-B 38 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 e-Logistics Building K IT-enabled Management of Sharing Logistic Trucks
ICE-B 39 20 min Monday 20 Session 1A 14:15 - 15:45 Collaboration and e-Services G02 Why and How People Use Location Sharing Services on Social Networking Platforms in China
ICE-B 40 Poster Monday 20 Poster Session 1 15:45 - 16:45 Enterprise Engineering Building K GSM Model Construction from Enterprise Models
OPTICS 7 30 min Wednesday 22 Session 6A 11:00 - 12:00 OPTICS - International Conference on Optical Communication Systems G04 Performance Analysis of a WDMA Protocol with a Multiple Tunable Receivers Node Architecture for High-speed Optical Fiber Lans
OPTICS 9 20 min Wednesday 22 Session 6A 11:00 - 12:00 OPTICS - International Conference on Optical Communication Systems G04 Pulley-type Ring Resonator and Optimization
OPTICS 10 20 min Wednesday 22 Session 6A 11:00 - 12:00 OPTICS - International Conference on Optical Communication Systems G04 Amplitude Modulation by Superposition of Independent Light Sources
OPTICS 13 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 OPTICS - International Conference on Optical Communication Systems Building K Measurement of the Distributed Strain and Temperature by Modeling the Brillouin Spectrum
OPTICS 14 20 min Tuesday 21 Session 3A 11:45 - 13:15 OPTICS - International Conference on Optical Communication Systems G04 Polarization Dependent Loss Emulator Built with Computer-driven Polarization Controllers and Single Mode Fibre
OPTICS 15 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 OPTICS - International Conference on Optical Communication Systems Building K Impact of Optical Preamplifier Beat Noise on Inter-Satellite Coherent Optical Communication System
OPTICS 16 30 min Tuesday 21 Session 3A 11:45 - 13:15 OPTICS - International Conference on Optical Communication Systems G04 Time Synchronization in XG-PON Systems: An Error Analysis
SECRYPT 2 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Building K hHB: A Harder HB+ Protocol
SECRYPT 4 30 min Wednesday 22 Session 6A 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography G05 WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification
SECRYPT 7 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery
SECRYPT 8 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K A Framework for Incident Response in Industrial Control Systems
SECRYPT 9 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Building K Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
SECRYPT 10 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange
SECRYPT 11 20 min Wednesday 22 Session 7A 14:30 - 15:30 SECRYPT - International Conference on Security and Cryptography G05 Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve
SECRYPT 14 20 min Monday 20 Session 1A 14:15 - 15:45 SECRYPT - International Conference on Security and Cryptography G05 Policy Anomaly Detection for Distributed IPv6 Firewalls
SECRYPT 19 30 min Wednesday 22 Session 5A 09:15 - 10:45 SECRYPT - International Conference on Security and Cryptography G05 A Flexible Architecture for Industrial Control System Honeypots
SECRYPT 20 20 min Tuesday 21 Session 3A 11:45 - 13:15 SECRYPT - International Conference on Security and Cryptography G05 Secure Physical Access Control with Strong Cryptographic Protection
SECRYPT 31 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K MEDA: A Machine Emulation Detection Algorithm
SECRYPT 33 30 min Tuesday 21 Session 4A 16:45 - 17:45 SECRYPT - International Conference on Security and Cryptography G05 Mobile Malware Detection using Op-code Frequency Histograms
SECRYPT 34 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Monitoring Software Vulnerabilities through Social Networks Analysis
SECRYPT 35 30 min Monday 20 Session 1B 14:15 - 15:45 SECRYPT - International Conference on Security and Cryptography G06 Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
SECRYPT 36 20 min Tuesday 21 Session 3A 11:45 - 13:15 SECRYPT - International Conference on Security and Cryptography G05 Private Eyes: Secure Remote Biometric Authentication
SECRYPT 39 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Building K Practical IBE Secure under CBDH - Encrypting Without Pairing
SECRYPT 41 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Revealing Encrypted WebRTC Traffic via Machine Learning Tools
SECRYPT 42 30 min Monday 20 Session 1B 14:15 - 15:45 SECRYPT - International Conference on Security and Cryptography G06 Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics
SECRYPT 43 30 min Monday 20 Session 1A 14:15 - 15:45 SECRYPT - International Conference on Security and Cryptography G05 Formal Analysis of E-Cash Protocols
SECRYPT 46 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K DPA Resistance Enhancement through a Self-healing PLL based Power Mask
SECRYPT 47 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Design and Performance Aspects of Information Security Prediction Markets for Risk Management
SECRYPT 48 20 min Wednesday 22 Session 7A 14:30 - 15:30 SECRYPT - International Conference on Security and Cryptography G05 MoCrySIL – Carry Your Cryptographic Keys in Your Pocket
SECRYPT 50 30 min Monday 20 Session 1A 14:15 - 15:45 SECRYPT - International Conference on Security and Cryptography G05 Algorithmic Information Theory for Obfuscation Security
SECRYPT 51 20 min Tuesday 21 Session 2A 10:00 - 11:30 SECRYPT - International Conference on Security and Cryptography G05 Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies
SECRYPT 53 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?
SECRYPT 57 20 min Wednesday 22 Session 5A 09:15 - 10:45 SECRYPT - International Conference on Security and Cryptography G05 Solving the Grid Defender’s Dilemma: Tamper Protection for Distributed Cyber-Physical Systems
SECRYPT 61 20 min Wednesday 22 Session 5A 09:15 - 10:45 SECRYPT - International Conference on Security and Cryptography G05 Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units
SECRYPT 64 20 min Wednesday 22 Session 7A 14:30 - 15:30 SECRYPT - International Conference on Security and Cryptography G05 Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET
SECRYPT 70 30 min Tuesday 21 Session 2A 10:00 - 11:30 SECRYPT - International Conference on Security and Cryptography G05 A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux
SECRYPT 73 20 min Monday 20 Session 1A 14:15 - 15:45 SECRYPT - International Conference on Security and Cryptography G05 Cloud Resources Placement based on Functional and Non-functional Requirements
SECRYPT 74 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Distributed Intrusion Detection System based on Anticipation and Prediction Approach
SECRYPT 75 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment
SECRYPT 79 30 min Wednesday 22 Session 6A 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography G05 Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position
SECRYPT 81 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment
SECRYPT 83 20 min Wednesday 22 Session 5B 09:15 - 10:45 SECRYPT - International Conference on Security and Cryptography G06 Light Blind: Why Encrypt If You Can Share?
SECRYPT 91 20 min Wednesday 22 Session 5A 09:15 - 10:45 SECRYPT - International Conference on Security and Cryptography G05 Scargos: Towards Automatic Vulnerability Distribution
SECRYPT 92 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K A Formally Verified Access Control Mechanism for Information Centric Networks
SECRYPT 93 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Building K A Note on Schoenmakers Algorithm for Multi Exponentiation
SECRYPT 97 30 min Wednesday 22 Session 5B 09:15 - 10:45 SECRYPT - International Conference on Security and Cryptography G06 Preserving Privacy in Collaborative Business Process Composition
SECRYPT 99 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Performance Evaluation of Meteor Key Distribution
SECRYPT 102 20 min Tuesday 21 Session 3A 11:45 - 13:15 SECRYPT - International Conference on Security and Cryptography G05 A Key-private Cryptosystem from the Quadratic Residuosity
SECRYPT 103 30 min Tuesday 21 Session 2A 10:00 - 11:30 SECRYPT - International Conference on Security and Cryptography G05 An OWL-based XACML Policy Framework
SECRYPT 106 30 min Tuesday 21 Session 3A 11:45 - 13:15 SECRYPT - International Conference on Security and Cryptography G05 New Results for Partial Key Exposure on RSA with Exponent Blinding
SECRYPT 107 30 min Tuesday 21 Session 4A 16:45 - 17:45 SECRYPT - International Conference on Security and Cryptography G05 On the Instability of Sensor Orientation in Gait Verification on Mobile Phone
SECRYPT 114 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection
SECRYPT 115 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Counter based Detection and Mitigation of Signalling Attacks
SECRYPT 117 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints
SECRYPT 118 20 min Wednesday 22 Session 5B 09:15 - 10:45 SECRYPT - International Conference on Security and Cryptography G06 Phish-IDetector: Message-Id Based Automatic Phishing Detection
SECRYPT 120 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations
SECRYPT 126 Poster Wednesday 22 Poster Session 3 15:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Building K Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES
SECRYPT 129 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K Practical and Secure Integrated PKE+PEKS with Keyword Privacy
SECRYPT 131 Poster Monday 20 Poster Session 1 15:45 - 16:45 SECRYPT - International Conference on Security and Cryptography Building K A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies
SIGMAP 1 20 min Tuesday 21 Session 4A 16:45 - 17:45 Multimedia Signal Processing G03 Gramophone Noise Reconstruction - A Comparative Study of Interpolation Algorithms for Noise Reduction
SIGMAP 3 30 min Tuesday 21 Session 3A 11:45 - 13:15 Multimedia Signal Processing G03 Compressed Domain ECG Biometric Identification using JPEG2000
SIGMAP 8 20 min Tuesday 21 Session 4A 16:45 - 17:45 Multimedia Signal Processing G03 Beat Discovery from Dimensionality Reduced Perspective Streams of Electrocardiogram Signal Data
SIGMAP 9 30 min Tuesday 21 Session 3A 11:45 - 13:15 Multimedia Signal Processing G03 An Adaptive Reconstruction Algorithm for Image Block Compressed Sensing under Low Sampling Rate
SIGMAP 12 20 min Monday 20 Session 1A 14:15 - 15:45 Multimedia Systems and Applications G03 Contrast-to-Noise based Metric of Denoising Algorithms for Liver Vein Segmentation
SIGMAP 13 30 min Tuesday 21 Session 3A 11:45 - 13:15 Multimedia Signal Processing G03 Traffic Signs Detection and Tracking using Modified Hough Transform
SIGMAP 14 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Multimedia Systems and Applications Building K Computational Correction for Imaging through Single Fresnel Lenses
SIGMAP 15 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Multimedia Systems and Applications Building K Objective Assessment of Asthenia using Energy and Low-to-High Spectral Ratio
SIGMAP 17 20 min Monday 20 Session 1A 14:15 - 15:45 Multimedia Signal Processing G03 A Time Delay based Approach to Enhance Lung Diseases Diagnostic
SIGMAP 18 20 min Tuesday 21 Session 4A 16:45 - 17:45 Multimedia Systems and Applications G03 Foveated Model based on the Action Potential of Ganglion Cells to Improve Objective Image Quality Metrics
SIGMAP 19 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Multimedia Systems and Applications Building K Real-time Super Resolution Algorithm for Security Cameras
SIGMAP 20 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Multimedia Systems and Applications Building K Mosaic-based Privacy-protection with Reversible Watermarking
SIGMAP 21 Poster Tuesday 21 Poster Session 2 15:45 - 16:45 Multimedia Systems and Applications Building K Similarity-based Image Retrieval for Revealing Forgery of Handwritten Corpora
WINSYS 2 20 min Monday 20 Session 1A 14:15 - 15:45 Wireless and Mobile Technologies G04 A High Performance Class of DSTBC for HAPs
WINSYS 3 20 min Monday 20 Session 1A 14:15 - 15:45 Sensor, Mesh and Ad Hoc Communications and Networks G04 Implementation of Radio Tomographic Imaging based Localisation using a 6LoWPAN Wireless Sensor Network
WINSYS 6 Poster Monday 20 Poster Session 1 15:45 - 16:45 Sensor, Mesh and Ad Hoc Communications and Networks Building K Localization Method According to Collect Data from an Acoustic Wireless Sensor Network - Example of Homarus Gammarus in Natural Area
WINSYS 7 20 min Monday 20 Session 1A 14:15 - 15:45 Sensor, Mesh and Ad Hoc Communications and Networks G04 A Wireless Sensor Network System - For Monitoring Trees’ Health Related Parameters in a University Campus
WINSYS 8 20 min Monday 20 Session 1A 14:15 - 15:45 Mobile Software and Services G04 An Efficient Agent Lookup Approach in Middlewares for Mobile Agents
WINSYS 9 20 min Monday 20 Session 1A 14:15 - 15:45 Sensor, Mesh and Ad Hoc Communications and Networks G04 Making Software-defined Networks Semantic
WINSYS 10 Poster Monday 20 Poster Session 1 15:45 - 16:45 Sensor, Mesh and Ad Hoc Communications and Networks Building K Minimising Energy Consumption in Wireless Sensor Network by Enhancement of LEACH Protocol
WINSYS 11 30 min Tuesday 21 Session 4A 16:45 - 17:45 Sensor, Mesh and Ad Hoc Communications and Networks G04 Performance and Comparative Analysis of Design Schemes for Prioritised Data in Multi-hop Wireless Mesh Backbone Networks
WINSYS 12 Poster Monday 20 Poster Session 1 15:45 - 16:45 Wireless and Mobile Technologies Building K Counting Credibility based Cooperative Spectrum Sensing Algorithm
WINSYS 13 30 min Tuesday 21 Session 4A 16:45 - 17:45 Wireless and Mobile Technologies G04 Probability-based Controlled Flooding in Opportunistic Networks