Event Paper Nr. Presentation Day Session Time Area Room Paper Title
DCNET 2 20 min Monday 18 Session 1 14:00 - 15:45 DCNET - International Conference on Data Communication Networking AULA A0.12 AN IMPROVED GMPLS SURVIVABILITY MECHANISM USING LINK DELAY-CONSTRAINED ALGORITHM
DCNET 5 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 DCNET - International Conference on Data Communication Networking Foyer RETHINKING ISP ARCHITECTURES THROUGH VIRTUALIZATION
DCNET 6 Poster Monday 18 Poster Session 1 15:45 - 16:15 DCNET - International Conference on Data Communication Networking Foyer NETWORK PLANNING OF A VOIP-CABLE PBX - The Use of Data Profiling Techniques for an Efficient Network Planning
DCNET 11 Poster Monday 18 Poster Session 1 15:45 - 16:15 DCNET - International Conference on Data Communication Networking Foyer SOFTWARE MODULES AND APPLICATION LAYER’S SECURITY STRUCTURE OF RSMAD
DCNET 14 30 min Tuesday 19 Session 3 09:00 - 10:30 DCNET - International Conference on Data Communication Networking AULA A0.12 MULTIPLE VECTOR CLASSIFICATION FOR P2P TRAFFIC IDENTIFICATION
DCNET 18 30 min Tuesday 19 Session 3 09:00 - 10:30 DCNET - International Conference on Data Communication Networking AULA A0.12 COMPUTATIONAL INTELLIGENCE APPLIED TO WILDFIRE PREDICTION USING WIRELESS SENSOR NETWORKS
DCNET 20 20 min Monday 18 Session 1 14:00 - 15:45 DCNET - International Conference on Data Communication Networking AULA A0.12 PERFORMANCE OF OPENDPI TO IDENTIFY TRUNCATED NETWORK TRAFFIC
DCNET 21 30 min Tuesday 19 Session 4 11:45 - 12:45 DCNET - International Conference on Data Communication Networking AULA A0.12 LOCALIZATION METHOD FOR LOW POWER CONSUMPTION SYSTEMS
DCNET 22 20 min Tuesday 19 Session 4 11:45 - 12:45 DCNET - International Conference on Data Communication Networking AULA A0.12 UTILIZING VIDEO ENCODING FOR POWER MANAGEMENT OVER WIRELESS NETWORKS
DCNET 24 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 DCNET - International Conference on Data Communication Networking Foyer APPLICATION-TRANSPARENT INTEGRATION OF SIMULATION TOOLS IN A WSN DEVELOPMENT ENVIRONMENT
DCNET 25 Poster Monday 18 Poster Session 1 15:45 - 16:15 DCNET - International Conference on Data Communication Networking Foyer TECHNICAL VIABILITY STUDY FOR BEHAVIORAL MONITORING OF WILDLIFE ANIMALS IN DOÑANA - An 802.15.4 Coverage Study in a Natural Park
DCNET 26 20 min Monday 18 Session 1 14:00 - 15:45 DCNET - International Conference on Data Communication Networking AULA A0.12 ANOMALY DETECTION USING FIREFLY HARMONIC CLUSTERING ALGORITHM
DCNET 27 30 min Tuesday 19 Session 3 09:00 - 10:30 DCNET - International Conference on Data Communication Networking AULA A0.12 MODEL-BASED STOCHASTIC SIMULATION OF SUPER PEER PROMOTION IN P2P VOIP USING GRAPH TRANSFORMATION
DCNET 29 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 DCNET - International Conference on Data Communication Networking Foyer ARCHITECTURE FOR ENVIRONMENTAL DATA ACCESS IN WSN
DCNET 31 20 min Monday 18 Session 1 14:00 - 15:45 DCNET - International Conference on Data Communication Networking AULA A0.12 OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS - Position Paper
ICE-B 3 Poster Monday 18 Poster Session 1 15:45 - 16:15 Enterprise Engineering Foyer A FRAMEWORK FOR CLASSIFYING RISKS IN ERP MAINTENANCE PROJECTS
ICE-B 9 20 min Tuesday 19 Session 4 11:45 - 12:45 Enterprise Engineering AULA A0.10 TECHNOLOGY FOR BUSINESS - Supporting Industries as a Main Driving Force for E-commerce Adoption in Saudi Arabia
ICE-B 10 20 min Monday 18 Session 1 14:00 - 15:45 Applications AULA A0.10 REALIZING THE STRATEGIC PLAN OF A TOP-TIER UNIVERSITY IN TAIWAN - A Multi-criteria Evaluation and Alignment
ICE-B 12 30 min Tuesday 19 Session 5 14:00 - 16:00 Collaboration and e-Services AULA A0.10 WHAT IS THE RIGHT SERVICE? A MULTI-CRITERIA DECISION MODEL BASED ON ‘STEP’
ICE-B 14 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Enterprise Engineering Foyer MODELING FACTORS THAT INFLUENCE ONLINE TRAVEL BOOKING
ICE-B 16 30 min Tuesday 19 Session 5 14:00 - 16:00 Collaboration and e-Services AULA A0.10 SUPPORTING SAFETY THROUGH SOCIAL TERRITORIAL NETWORKS
ICE-B 20 20 min Tuesday 19 Session 6 16:30 - 18:00 Applications AULA A0.10 COLLECTIVETHOUGHT - Supporting Virtual Teams with Semantic Networks
ICE-B 23 30 min Monday 18 Session 1 14:00 - 15:45 Applications AULA A0.10 VALUE-ADDED SERVICES FOR FIBRE TO THE HOME - Market Potential, Time Horizons and User Groups
ICE-B 25 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Enterprise Engineering Foyer BUSINESS MODEL APROACH FOR QOE OPTIMIZED SERVICE DELIVERY
ICE-B 26 20 min Tuesday 19 Session 4 11:45 - 12:45 Enterprise Engineering AULA A0.10 TOWARD AUTOMATIC GENERATION OF SPARQL RESULT SET VISUALIZATIONS - A Use Case in Service Monitoring
ICE-B 33 Poster Monday 18 Poster Session 1 15:45 - 16:15 Applications Foyer INFORMATION SYSTEMS AND E-BUSINESS - Risc and Value of Applications to Organizations
ICE-B 35 20 min Wednesday 20 Session 7 09:00 - 10:30 Applications AULA A0.10 SUCCESSFUL IMPLEMENTED THEORIES FOR REFERENCE CLASS FORECASTING IN INDUSTRIAL FIELD
ICE-B 37 30 min Monday 18 Session 1 14:00 - 15:45 Applications AULA A0.10 SHOULD COMPANIES BID ON THEIR OWN BRAND IN SPONSORED SEARCH?
ICE-B 39 20 min Wednesday 20 Session 7 09:00 - 10:30 Applications AULA A0.10 BLENDED SHOPPING - Interactivity and Individualization
ICE-B 40 Poster Monday 18 Poster Session 1 15:45 - 16:15 Applications Foyer CUSTOMER FEEDBACK AND INTERNET - Means used by the Biggest Portuguese Companies
ICE-B 41 20 min Wednesday 20 Session 8 11:45 - 12:45 Collaboration and e-Services AULA A0.10 RESOURCE ORIENTED MODELLING - Describing Restful Web Services using Collaboration Diagrams
ICE-B 43 30 min Tuesday 19 Session 5 14:00 - 16:00 Collaboration and e-Services AULA A0.10 QUALITY OF SERVICE AGGREGATION IN E-BUSINESS APPLICATIONS
ICE-B 44 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Technology Platforms Foyer EVALUATION OF NEW DISTRIBUTION CHANNELS FOR IP INTERACTIVE QOE BASED SERVICES
ICE-B 47 20 min Wednesday 20 Session 9 14:00 - 15:15 Collaboration and e-Services AULA A0.10 USER-CENTRIC USABILITY EVALUATION FOR ENTERPRISE 2.0 PLATFORMS - A Complementary Multi-method Approach
ICE-B 48 30 min Tuesday 19 Session 5 14:00 - 16:00 Mobility AULA A0.10 HANDWRITING RECOGNITION ON MOBILE DEVICES - State of the Art Technology, Usability and Business Analysis
ICE-B 49 20 min Wednesday 20 Session 7 09:00 - 10:30 Applications AULA A0.10 APPLYING ASPECT ORIENTED PROGRAMMING IN USABILITY ENGINEERING PROCESSES - On the Example of Tracking Usage Information for Remote Usability Testing
ICE-B 50 20 min Wednesday 20 Session 7 09:00 - 10:30 Applications AULA A0.10 RAPID PROTOTYPING ON THE EXAMPLE OF SOFTWARE DEVELOPMENT IN AUTOMOTIVE INDUSTRY - The Importance of their Provision for Software Projects at the Correct Time
ICE-B 51 Poster Monday 18 Poster Session 1 15:45 - 16:15 Collaboration and e-Services Foyer ABOUT CREATIVITY IN COLLABORATIVE SYSTEMS - Why it Matters and How it can be Supported
ICE-B 55 20 min Wednesday 20 Session 9 14:00 - 15:15 Collaboration and e-Services AULA A0.10 ARCHAEOLOGICAL SCAVENGER HUNT ON MOBILE DEVICES: FROM E-EDUCATION TO E-BUSINESS - A Triple Adaptive Mobile Application for Supporting Experts, Tourists and Children
ICE-B 63 Poster Monday 18 Poster Session 1 15:45 - 16:15 Mobility Foyer A PROPOSAL OF “IDENTITY COMMONS” FOR SERVICE CREATION USING COMMUNICATION LOG - Position Paper
ICE-B 64 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Applications Foyer STUDY ON SUCCESS FACTORS OF TOURISM WEBSITES
ICE-B 65 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Collaboration and e-Services Foyer A MOTIVATION FOR A MODERN WEB SERVICE DESCRIPTION
ICE-B 67 20 min Wednesday 20 Session 8 11:45 - 12:45 Collaboration and e-Services AULA A0.10 AN APPROACH TO METAMORPHIC TESTING FOR WS-BPEL COMPOSITIONS
ICE-B 68 20 min Wednesday 20 Session 8 11:45 - 12:45 Collaboration and e-Services AULA A0.10 TOWARDS HIGHER-ORDER MUTANT GENERATION FOR WS-BPEL
ICE-B 69 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Collaboration and e-Services Foyer SEMANTIC-BASED DELIVERY OF E-SERVICES APPLYING THE SAAS APPROACH - Poster Paper
ICE-B 70 20 min Monday 18 Session 1 14:00 - 15:45 Enterprise Engineering AULA A0.10 E-BUSINESS INTEROPERABILITY - Challenges and Opportunities
ICE-B 71 30 min Tuesday 19 Session 6 16:30 - 18:00 Applications AULA A0.10 THE DEVELOPMENT OF A WEB MAPPING SYSTEM AND ITS APPLICATION
SIGMAP 10 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Multimedia Signal Processing Foyer COLOR FACE RECOGNITION - A Multilinear-PCA Approach Combined with Hidden Markov Models
SIGMAP 11 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Multimedia Signal Processing Foyer REAL-TIME FACE RECOGNITION WITH GPUs - A DCT-based Face Recognition System using Graphics Processing Unit
SIGMAP 12 20 min Monday 18 Session 2a 16:15 - 17:45 Multimedia Systems and Applications AULA A0.12 CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES
SIGMAP 16 30 min Monday 18 Session 2 16:15 - 17:45 Multimedia Systems and Applications AULA A0.10 THE WINDSURF LIBRARY FOR THE EFFICIENT RETRIEVAL OF MULTIMEDIA HIERARCHICAL DATA
SIGMAP 20 30 min Tuesday 19 Session 5 14:00 - 16:00 Multimedia Signal Processing AULA A0.12 A NON-UNIFORM REAL-TIME SPEECH TIME-SCALE STRETCHING METHOD
SIGMAP 21 30 min Tuesday 19 Session 5 14:00 - 16:00 Multimedia Signal Processing AULA A0.12 ESTIMATION-DECODING ON LDPC-BASED 2D-BARCODES
SIGMAP 23 30 min Tuesday 19 Session 5 14:00 - 16:00 Multimedia Signal Processing AULA A0.12 HAND IMAGE SEGMENTATION BY MEANS OF GAUSSIAN MULTISCALE AGGREGATION FOR BIOMETRIC APPLICATIONS
SIGMAP 25 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Multimedia Signal Processing Foyer STEREO VISION MATCHING OVER SINGLE-CHANNEL COLOR-BASED SEGMENTATION
SIGMAP 27 Poster Monday 18 Poster Session 1 15:45 - 16:15 Multimedia and Communications Foyer TWO – DIMENSIONAL CODES ON MOBILE DEVICES AND THE DEVELOPMENT OF THE PLATFORM
SIGMAP 29 30 min Monday 18 Session 2 16:15 - 17:45 Multimedia Systems and Applications AULA A0.10 LATENT TOPIC VISUAL LANGUAGE MODEL FOR OBJECT CATEGORIZATION
SIGMAP 30 20 min Monday 18 Session 2a 16:15 - 17:45 Multimedia Systems and Applications AULA A0.12 EFFECTIVE INTERFERENCE REDUCTION METHOD FOR SPREAD SPECTRUM FINGERPRINTING
SIGMAP 33 30 min Tuesday 19 Session 5 14:00 - 16:00 Multimedia Signal Processing AULA A0.12 SEGMENTATION OF TOUCHING LANNA CHARACTERS
SIGMAP 34 20 min Wednesday 20 Session 9 14:00 - 15:15 Multimedia Signal Processing AULA A0.12 3D VISUALIZATION OF SINGLE IMAGES USING PATCH LEVEL DEPTH
SIGMAP 36 20 min Wednesday 20 Session 7 09:00 - 10:30 Multimedia and Communications AULA A0.12 ACCURACY OF MP3 SPEECH RECOGNITION UNDER REAL-WORD CONDITIONS - Experimental Study
SIGMAP 37 20 min Wednesday 20 Session 7 09:00 - 10:30 Multimedia Systems and Applications AULA A0.12 SENSES - WHAT U SEE? - Vision Screening System Dedicated for iOS Based Devices Development and Screening Results
SIGMAP 41 Poster Monday 18 Poster Session 1 15:45 - 16:15 Multimedia Systems and Applications Foyer EXPLORING THE DIFFERENCES IN SURFACE ELECTROMYOGRAPHIC SIGNAL BETWEEN MYOFASCIAL-PAIN AND NORMAL GROUPS - Feature Extraction through Wavelet Denoising and Decomposition
SIGMAP 42 20 min Tuesday 19 Session 6 16:30 - 18:00 Multimedia Signal Processing AULA A0.12 IMAGE DENOISING BASED ON LAPLACE DISTRIBUTION WITH LOCAL PARAMETERS IN LAPPED TRANSFORM DOMAIN
SIGMAP 43 20 min Tuesday 19 Session 6 16:30 - 18:00 Multimedia Signal Processing AULA A0.12 IMPROVED INTER MODE DECISION FOR H.264/AVC USING WEIGHTED PREDICTION
SIGMAP 45 20 min Tuesday 19 Session 6 16:30 - 18:00 Multimedia Signal Processing AULA A0.12 IMAGE MATCHING ALGORITHMS IN STEREO VISION USING ADDRESS-EVENT-REPRESENTATION - A Theoretical Study and Evaluation of the Different Algorithms
SIGMAP 46 20 min Wednesday 20 Session 7 09:00 - 10:30 Multimedia and Communications AULA A0.12 TRANSMISSION OF LOW-MOTION JPEG2000 IMAGE SEQUENCES USING CLIENT-DRIVEN CONDITIONAL REPLENISHMENT
SIGMAP 48 20 min Wednesday 20 Session 9 14:00 - 15:15 Multimedia Signal Processing AULA A0.12 VISUAL AER-BASED PROCESSING WITH CONVOLUTIONS FOR A PARALLEL SUPERCOMPUTER
SIGMAP 51 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Multimedia Signal Processing Foyer VIDEO SURVEILLANCE AT AN INDUSTRIAL ENVIRONMENT USING AN ADDRESS EVENT VISION SENSOR - Comparative between Two Different Video Sensor based on a Bioinspired Retina
SIGMAP 56 20 min Wednesday 20 Session 7 09:00 - 10:30 Multimedia Systems and Applications AULA A0.12 QUALITY EVALUATION OF NOVEL DTD ALGORITHM BASED ON AUDIO WATERMARKING
SIGMAP 58 20 min Wednesday 20 Session 9 14:00 - 15:15 Multimedia Signal Processing AULA A0.12 AER SPIKE-PROCESSING FILTER SIMULATOR - Implementation of an AER Simulator based on Cellular Automata
SIGMAP 59 20 min Monday 18 Session 2 16:15 - 17:45 Multimedia Signal Processing AULA A0.10 A GENETIC APPROACH FOR IMPROVING THE SIDE INFORMATION IN WYNER-ZIV VIDEO CODING WITH LONG DURATION GOP
SIGMAP 60 20 min Monday 18 Session 2a 16:15 - 17:45 Multimedia Systems and Applications AULA A0.12 OPTIMAL COMBINATION OF LOW-LEVEL FEATURES FOR SURVEILLANCE OBJECT RETRIEVAL
SIGMAP 61 Poster Monday 18 Poster Session 1 15:45 - 16:15 Multimedia Systems and Applications Foyer AUTOMATIC SOUND RESTORATION SYSTEM - Concepts and Design
SIGMAP 64 30 min Tuesday 19 Session 6 16:30 - 18:00 Multimedia Signal Processing AULA A0.12 WIRELESS IN-VEHICLE COMPLAINT DRIVER ENVIRONMENT RECORDER
SIGMAP 65 Poster Monday 18 Poster Session 1 15:45 - 16:15 Multimedia Systems and Applications Foyer A SPATIAL IMMERSIVE OFFICE ENVIRONMENT FOR COMPUTER-SUPPORTED COLLABORATIVE WORK - Moving Towards the Office of the Future
SIGMAP 66 Poster Monday 18 Poster Session 1 15:45 - 16:15 Multimedia Systems and Applications Foyer FOUR-PHASE RE-SPEAKER TRAINING SYSTEM
SIGMAP 68 20 min Monday 18 Session 2a 16:15 - 17:45 Multimedia Signal Processing AULA A0.12 WHAT ARE GOOD CGS/MGS CONFIGURATIONS FOR H.264 QUALITY SCALABLE CODING?
SIGMAP 73 20 min Wednesday 20 Session 9 14:00 - 15:15 Multimedia Systems and Applications AULA A0.12 MANAGING MULTIPLE MEDIA STREAMS IN HTML5 - The IEEE 1599-2008 Case Study
OPTICS 1 20 min Tuesday 19 Session 6 16:30 - 18:00 OPTICS - International Conference on Optical Communication Systems AULA A0.13 A STABLE TUNABLE AND SWITCHABLE DUAL-WAVELENGTH SINGLE-LONGITUDINAL-MODE ERBIUM-DOPED FIBER LINEAR-CAVITY LASER
OPTICS 2 20 min Tuesday 19 Session 6 16:30 - 18:00 OPTICS - International Conference on Optical Communication Systems AULA A0.13 OPTICAL MIMO MULTIMODE FIBER LINKS - Channel Measurements and System Performance Analysis
OPTICS 9 20 min Tuesday 19 Session 6 16:30 - 18:00 OPTICS - International Conference on Optical Communication Systems AULA A0.13 OPTIMIZATION OF OPTICAL SSB-OFDM SYSTEM WITH DIRECT DETECTION FOR APPLICATION IN METROPOLITAN/REGIONAL NETWORKS
OPTICS 12 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 OPTICS - International Conference on Optical Communication Systems Foyer OPTICAL DOMAIN MULTIUSER INTERFERENCE ESTIMATION FOR SPECTRAL PHASE ENCODING OPTICAL FIBRE CDMA SYSTEMS
OPTICS 13 30 min Tuesday 19 Session 6 16:30 - 18:00 OPTICS - International Conference on Optical Communication Systems AULA A0.13 PHOTONIC ANALOGUE-TO-DIGITAL CONVERTER BASED ON WAVELENGTH DIVISION MULTIPLEXING TECHNIQUE
SECRYPT 22 20 min Wednesday 20 Session 9 14:00 - 15:15 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A STATIC SOFTWARE BIRTHMARK BASED ON USE-DEFINE CHAINS FOR DETECTING THE THEFT OF JAVA PROGRAMS
SECRYPT 30 30 min Tuesday 19 Session 3a 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.10 ANOMALY-BASED SPAM FILTERING
SECRYPT 31 20 min Wednesday 20 Session 7 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION
SECRYPT 32 30 min Tuesday 19 Session 5 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.11 THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
SECRYPT 33 30 min Tuesday 19 Session 4 11:45 - 12:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 SMARTPHONE SECURITY EVALUATION - The Malware Attack Case
SECRYPT 34 20 min Wednesday 20 Session 9 14:00 - 15:15 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A SECURITY METRICS FRAMEWORK FOR THE CLOUD
SECRYPT 35 30 min Monday 18 Session 1 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree
SECRYPT 37 30 min Tuesday 19 Session 3 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A METHOD FOR FLEXIBLE REDUCTION OVER BINARY FIELDS USING A FIELD MULTIPLIER
SECRYPT 41 30 min Tuesday 19 Session 3a 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.10 RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS
SECRYPT 43 20 min Tuesday 19 Session 5a 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.13 COLLECTIVE CLASSIFICATION FOR UNKNOWN MALWARE DETECTION
SECRYPT 47 20 min Monday 18 Session 1a 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.13 ANALYSIS OF BOTNETS THROUGH LIFE-CYCLE
SECRYPT 49 30 min Tuesday 19 Session 3 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.11 ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING
SECRYPT 56 30 min Tuesday 19 Session 3 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.11 DRIVER AUTHENTICATION USING BRAIN WAVES WHILE ROUTE TRACING AS A MENTAL TASK
SECRYPT 58 30 min Monday 18 Session 1a 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.13 EMBEDDING RATIO ESTIMATION BASED ON WEIGHTED STEGO IMAGE FOR EMBEDDING IN 2LSB
SECRYPT 59 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer PRIVATE SEARCHING FOR SENSITIVE FILE SIGNATURES
SECRYPT 60 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer THE IMAGE PROTECTOR - A Flexible Security Rule Specification Toolkit
SECRYPT 66 20 min Monday 18 Session 1 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 ON THE SECURITY OF LOCATION DETERMINATION AND VERIFICATION METHODS FOR WIRELESS NETWORKS
SECRYPT 73 20 min Tuesday 19 Session 4 11:45 - 12:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS
SECRYPT 74 30 min Monday 18 Session 2 16:15 - 17:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE
SECRYPT 75 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES - A New Steganographic Scheme
SECRYPT 77 30 min Tuesday 19 Session 5 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.11 PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY
SECRYPT 79 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer DIFFERENTIAL FAULT ANALYSIS OF HUMMINGBIRD
SECRYPT 83 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer A NEW TREE-STRUCTURE-SPECIFIED MULTISIGNATURE SCHEME FOR A DOCUMENT CIRCULATION SYSTEM
SECRYPT 85 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES
SECRYPT 86 30 min Tuesday 19 Session 6 16:30 - 18:00 SECRYPT - International Conference on Security and Cryptography AULA A0.11 BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl
SECRYPT 87 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer SYNEMA: VISUAL MONITORING OF NETWORK AND SYSTEM SECURITY SENSORS
SECRYPT 88 30 min Tuesday 19 Session 5 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.11 INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
SECRYPT 90 30 min Tuesday 19 Session 6 16:30 - 18:00 SECRYPT - International Conference on Security and Cryptography AULA A0.11 ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
SECRYPT 91 30 min Tuesday 19 Session 3a 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.10 ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs
SECRYPT 92 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer PRIVACY--ENHANCING CRYPTOGRAPHY--BASED MATERIALS
SECRYPT 95 30 min Monday 18 Session 2 16:15 - 17:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel
SECRYPT 97 20 min Tuesday 19 Session 5a 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.13 IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY ‘MALFORMED MESSAGE’ ATTACKS? - An Evaluation of OpenIMS
SECRYPT 99 20 min Wednesday 20 Session 7 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.11 ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS
SECRYPT 104 20 min Tuesday 19 Session 5a 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.13 A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
SECRYPT 105 20 min Wednesday 20 Session 7 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.11 COLLUDING TAGS ATTACK ON THE ECC-BASED GROUPING PROOFS FOR RFIDS
SECRYPT 106 20 min Monday 18 Session 1a 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.13 UNOBSERVABLE INTRUSION DETECTION BASED ON CALL TRACES IN PARAVIRTUALIZED SYSTEMS
SECRYPT 108 30 min Monday 18 Session 1a 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.13 A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION
SECRYPT 109 30 min Tuesday 19 Session 5 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.11 HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS
SECRYPT 110 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer TOWARDS A CALCULUS FOR NON REPUDIATION PROTOCOLS
SECRYPT 112 30 min Tuesday 19 Session 6 16:30 - 18:00 SECRYPT - International Conference on Security and Cryptography AULA A0.11 A SNORT-BASED MOBILE AGENT FOR A DISTRIBUTED INTRUSION DETECTION SYSTEM
SECRYPT 114 20 min Monday 18 Session 1 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 BOTNET DETECTION BASED ON DNS RECORDS AND ACTIVE PROBING
SECRYPT 116 20 min Tuesday 19 Session 5a 14:00 - 16:00 SECRYPT - International Conference on Security and Cryptography AULA A0.13 E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation
SECRYPT 117 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT
SECRYPT 118 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK
SECRYPT 124 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS
SECRYPT 125 20 min Wednesday 20 Session 7 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography AULA A0.11 BLACK-BOX COLLISION ATTACKS ON THE COMPRESSION FUNCTION OF THE GOST HASH FUNCTION
SECRYPT 126 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
SECRYPT 129 20 min Wednesday 20 Session 9 14:00 - 15:15 SECRYPT - International Conference on Security and Cryptography AULA A0.11 TOWARDS AN AUTHORIZATION SYSTEM FOR CLOUD INFRASTRUCTURE PROVIDERS
SECRYPT 142 30 min Monday 18 Session 1 14:00 - 15:45 SECRYPT - International Conference on Security and Cryptography AULA A0.11 CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
SECRYPT 148 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use
SECRYPT 153 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer TOWARDS AN INFORMATION CONTROL POLICY MODEL - Achieving More Transparency in Internet Filtering Approaches
SECRYPT 155 Poster Monday 18 Poster Session 1 15:45 - 16:15 SECRYPT - International Conference on Security and Cryptography Foyer FAST SELECTIVE ENCRYPTION SCHEME FOR MP3 FILES - Using GRAIN Stream Cipher
SECRYPT 157 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer NO SECURITY BY OBSCURITY – WHY TWO FACTOR AUTHENTICATION SHOULD BE BASED ON AN OPEN DESIGN
SECRYPT 158 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM
SECRYPT 160 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION
SECRYPT 162 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 SECRYPT - International Conference on Security and Cryptography Foyer A PUBLIC RANDOMNESS SERVICE
WINSYS 7 20 min Monday 18 Session 2 16:15 - 17:45 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 DEVELOPMENT TOOLS FOR PERVASIVE COMPUTING IN EMBEDDED SYSTEMS (PECES) MIDDLEWARE
WINSYS 8 20 min Tuesday 19 Session 3 09:00 - 10:30 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 MAC SCHEDULING IN LARGE-SCALE UNDERWATER ACOUSTIC NETWORKS
WINSYS 10 20 min Wednesday 20 Session 7 09:00 - 10:30 Wireless and Mobile Technologies AULA A0.13 WIDEBAND WIRELESS PROPAGATION IN CONFINED SPACES
WINSYS 11 30 min Tuesday 19 Session 4 11:45 - 12:45 Wireless and Mobile Technologies AULA A0.13 MODULATION-MODE ASSIGNMENT IN SVD-ASSISTED MULTIUSER MIMO-OFDM SYSTEMS
WINSYS 12 20 min Tuesday 19 Session 3 09:00 - 10:30 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 DEPLOYMENT OF A WIRELESS SENSOR NETWORK IN A VINEYARD
WINSYS 16 20 min Monday 18 Session 2 16:15 - 17:45 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 QOS-AWARE MULTIPATH ROUTING PROTOCOL FOR DELAY SENSITIVE APPLICATIONS IN MANETS - A Cross-layer Approach
WINSYS 18 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Sensor, Mesh and Ad Hoc Communications and Networks Foyer MULTIPLE TARGETS DETECTION AND LOCALIZATION BASED ON BLIND ESTIMATION IN WIRELESS SENSOR NETWORK
WINSYS 22 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Sensor, Mesh and Ad Hoc Communications and Networks Foyer A LOAD-BALANCED TOPOLOGY MAINTENANCE WITH PARTIAL RECONSTRUCTION OF CONNECTED DOMINATING SETS
WINSYS 23 30 min Tuesday 19 Session 4 11:45 - 12:45 Wireless and Mobile Technologies AULA A0.13 EXPERIMENTAL VALIDATION FOR TR-UWB SYSTEMS - By Time Delayed Sampling & Correlation (TDSC)
WINSYS 26 20 min Tuesday 19 Session 3 09:00 - 10:30 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 FINGERPRINT INDOOR POSITION SYSTEM BASED ON OPENMAC
WINSYS 27 30 min Monday 18 Session 2 16:15 - 17:45 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 DISTRIBUTED JOINT POWER AND RATE ADAPTATION IN AD HOC NETWORKS
WINSYS 29 20 min Tuesday 19 Session 3 09:00 - 10:30 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS
WINSYS 39 Poster Monday 18 Poster Session 1 15:45 - 16:15 Wireless and Mobile Technologies Foyer AN INTELLIGENT MAINTENANCE BASED ON MACHINE LEARNING APPROACH FOR WIRELESS AND MOBILE SYSTEMS
WINSYS 41 20 min Wednesday 20 Session 7 09:00 - 10:30 Wireless and Mobile Technologies AULA A0.13 COMPLEXITY ANALYSIS OF A HYBRID THRESHOLD-BASED ZF-MMSE EQUALIZER FOR SIC-BASED MIMO-OFDM RECEIVERS
WINSYS 42 Poster Tuesday 19 Poster Session 2 16:00 - 16:30 Sensor, Mesh and Ad Hoc Communications and Networks Foyer EFFICIENT NETWORK DESIGN FOR ENVIRONMENTAL MONITORING APPLICATIONS - A Practical Approach
WINSYS 43 30 min Wednesday 20 Session 8 11:45 - 12:45 Wireless and Mobile Technologies AULA A0.13 CONGESTION CONTROL WITH DYNAMIC THRESHOLD ADAPTATION AND CROSS-LAYER RESPONSE FOR TCP OVER IEEE 80.11 WIRELESS NETWORKS
WINSYS 44 30 min Wednesday 20 Session 8 11:45 - 12:45 Sensor, Mesh and Ad Hoc Communications and Networks AULA A0.13 APPLICATION OF ANT COLONY OPTIMIZATION TO DEVELOP ENERGY EFFICIENT PROTOCOL IN MOBILE AD-HOC NETWORKS