09:00 |
-
7:
Some Synchronization Issues in OSPF Routing
Anne Bouillard, Claude Jard and Aurore Junier
-
12:
HyVVE - A Voronoi based Hybrid Architecture for Massively Multiplayer On-line Games
Laura Ricci, Luca Genovali and Barbara Guidi
-
4:
Evaluation of Video Transmission in Emergency Response Ad Hoc Networks
C. Bouras, G. Kioumourtzis, A. Gkamas, V. Kapoulas, D. Politaki and E. Tsanai
-
24:
An Interactive Evaluation Method of Decentralized Procurement Plan by Multi-Objective Genetic Algorithm
Ryoji Kobayashi, Masakatsu Mori, Masaki Samejima and Norihisa Komoda
-
10:
Electronic Human Resource Management Strategies for Atypical Employment
Volker Stein and Tobias M. Scholz
-
33:
A Distributed CTL Model Checker
Laura Florentina Cacovean, Florian Mircea Boian and Florin Stoica
-
16:
Improving Block Cipher Design by Rearranging Internal Operations
Liran Lerman, Jorge Nakahara Jr and Nikita Veshchikov
-
67:
Towards Cryptographic Function Distinguishers with Evolutionary Circuits
Petr Svenda, Martin Ukrop and Vashek Matyas
-
88:
Behavior-based Malware Analysis using Profile Hidden Markov Models
Saradha Ravi, Balakrishnan N. and Bharath Venkatesh
-
32:
A Key-revocable Attribute-based Encryption for Mobile Cloud Environments
Tsukasa Ishiguro, Shinsaku Kiyomoto and Yutaka Miyake
-
42:
Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
Lan Zhou, Vijay Varadharajan and Michael Hitchens
-
76:
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control
Bo Lang, Runhua Xu and Yawei Duan
-
2:
Reliability Analysis of IEEE 802.11p Wireless Communication and Vehicle Safety Applications
Unai Hernández-Jayo and Idoia De-la-Iglesia
-
24:
RealWorld Testing of Aggregation in Publish/Subscribe Systems
Michael Schiefer, Christoph Steup and Jörg Kaiser
-
26:
VIMENO: A VirtualWireless Mesh Network Architecture for Operators
Katarzyna Kosek-Szott, Janusz Gozdecki, Krzysztof Loziak, Marek Natkaniec, Szymon Szott and Michal Wagrowski
|
10:30 |
Coffee-Break (10:30 - 10:45)
|
10:45 |
-
40:
Continuous Improvement of Geographic Data Production Processes - Approach and Results of a Case Study
Wolfgang Reinhardt and Thorsten Bockmühl
-
54:
Continuous Information Provisioning for the Conference Participation Process
Paul Heiniz, Wolfgang Kluth, Karl-Heinz Krempels, Christoph Terwelp and Stefan Wüller
-
56:
Increase of Travel Safety for Public Transport by Mobile Applications
Wolfgang Kluth, Karl-Heinz Krempels, Christoph Terwelp and Stefan Wüller
-
38:
Emerging Trends in Local Governments Web Strategies - Citizen Web Empowerment Assessment in Italy
Elena Bellio and Luca Buccoliero
-
55:
The Development of ``BAU GIS'' Web/Program using Open Source MapWindow
B. Sadoun, O. Al-Bayari, J. Al-Azizi and Samih B. Al Rawashdeh
-
35:
Marketing and Fundraising through Mobile Phones - New Strategies for Non Profit Organizations and Charities
Elena Bellio, Luca Buccoliero and Giorgio Fiorentini
-
2:
Dispersion Analysis within a Measured 1,4 km MIMO Multimode Channel
Andreas Ahrens, Steffen Schroeder and Steffen Lochmann
-
3:
Optical Couplers in Multimode MIMO Transmission Systems - Measurement Results and Performance Analysis
Andreas Ahrens and Steffen Lochmann
-
11:
Experimental Distribution of OFDM-UWB Radio Signals along Directly Modulated Long-reach Pons Indicated for Sparse Geographical Areas
Tiago M. F. Alves Alves and Adolfo V. T. Cartaxo
-
8:
InCC: Hiding Information By Mimicking Traffic In Network Flows
Luis Campo Giralte, Cristina Conde, Isaac Martin De Diego and Enrique Cabello
-
81:
Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data
Simone Bongiovanni, Giuseppe Scotti and Alessandro Trifiletti
-
112:
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle and Franck Rondepierre
-
49:
A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software
Ioannis Chionis, Maria Chroni and Stavros D. Nikolopoulos
-
61:
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL
Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama and Kazuo Ohta
-
66:
Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks
E. Ciancamerla, M. Minichino and S. Palmieri
|
12:15 |
|
13:15 |
Lunch (13:15 - 14:30)
|
14:30 |
-
19:
Which Clicks Lead to Conversions? - Modeling User-journeys Across Multiple Types of Online Advertising
Florian Nottorf
-
22:
Virtual Currency for Online Platforms - Business Model Implications
Uschi Buchinger, Heritiana Ranaivoson and Pieter Ballon
-
41:
From e-Supply Chain Capability Generation to Information Technology Value Co-creation - A Perspective of e-Business Process
Jing Zhao and Yi Jiang
-
45:
Estimating the Effort in the Development of Distance Learning Paths
Milena Casagranda, Luigi Casagranda and Andrea Molinari
-
60:
Which Side Are You On? - A New Panopticon vs. Privacy
Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou and Dimitris Gritzalis
-
19:
Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks
Jan Hajny, Lukas Malina, Zdenek Martinasek and Vaclav Zeman
-
47:
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction
Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kouhei Kasamatsu, Takashi Yamakawa and Hideki Imai
-
116:
Privacy-preserving Realization of the STORK Framework in the Public Cloud
Bernd Zwattendorfer and Daniel Slamanig
-
122:
Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE
Michael Clear and Ciarán McGoldrick
-
107:
Secure Alert Tracking in Supply Chain
Mehdi Khalfaoui, Refik Molva and Laurent Gomez
-
31:
Dynamic Proofs of Retrievability from Chameleon-Hashes
Stefan Rass
-
79:
An Efficient and Provably Secure Certificateless Identification Scheme
Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia and Swee-Huay Heng
-
93:
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting
Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen and Aurélien Francillon
-
96:
A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities
Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías and Juan J. Igarza
-
27:
Optimization of Free Viewpoint Interpolation by Applying Adaptive Depth Plane Distributions in Plane Sweeping - A Histogram-based Approach to a Non-uniform Plane Distribution
Patrik Goorts, Steven Maesen, Maarten Dumont, Sammy Rogmans and Philippe Bekaert
-
30:
Improving the Performance of Speaker Verification Systems under Noisy Conditions using Low Level Features and Score Level Fusion
Nassim Asbai, Messaoud Bengherabi, Farid Harizi and Abderrahmane Amrouche
-
18:
Multi-Point Measurement System and Data Processing for Earthquakes Monitoring
Valery Korepanov and Fedir Dudkin
-
25:
Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image
Seiichi Gohshi and Isao Echizen
-
29:
A Linearvibrotactile Actuator for Mobile Devices
Sang-Youn Kim, Bonggoo Kim and Tae-Heon Yang
|
16:30 |
-
32:
The Influence of Virtualization of Resources Acquisition Processes on the Enterprises Competitiveness
Dorota Jelonek, Cezary Stepniak, Tomasz Turek and Leszek Ziora
-
42:
The Concept of Building Regional Business Spatial Community
Dorota Jelonek, Cezary Stepniak and Tomasz Turek
-
47:
Proposed Use of Sharepoint to Improve New Employee In-processing
Tyna Webber, Wai Yin Mok and Kit Yee Cheung
-
138:
Public-key Cryptography from Different Assumptions - A Multi-bit Version
Herve Chabanne, Gerard Cohen and Alain Patey
-
139:
Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs
Z. Cliffe Schreuders and Adil M. Bhat
-
140:
Approaching Encryption through Complex Number Logarithms
George Stergiopoulos, Miltiadis Kandias and Dimitris Gritzalis
-
151:
MINHO - A Novel Authentication Scheme based on Pre-Authentication Service
Hasan Kadhem
-
157:
A Model-driven Approach for Securing Software Architectures
Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti and Stefano Paraboschi
-
163:
A Preliminary Application of Generalized Fault Trees to Security
Daniele Codetta-Raiteri
-
164:
E3SN - Efficient Security Scheme for Sensor Networks
Hassan Noura, Steven Martin and Khaldoun Al Agha
-
45:
An Unsupervised Ensemble-based Markov Random Field Approach to Microscope Cell Image Segmentation
Bálint Antal, Bence Remenyik and András Hajdu
-
46:
SAO Filtering inside CTU Loop for High Efficiency Video Coding
Adireddy Ramakrishna, N. S. Prashanth and G. B. Praveen
-
9:
Moving Object Classifier based on UWB Radar Signal
Chong Hyun Lee, Youn Joung Kang, Jinho Bae, Seung Wook Lee, Jungchae Shin and Jin Woo Jung
-
28:
Prediction of Spectrum based on Improved RBF Neural Network in Cognitive Radio
Shibing Zhang, Jinming Hu, Zhihua Bao and Jianrong Wu
|
16:45 |
Coffee-Break (16:45 - 17:00)
|