Paper Nr. Presentation Day Session Time Area Room Paper Title
2 Poster Monday 9 Poster Session 1 16:30 - 17:30 Data and Software Security Foyer Optimizing Cryptographically based Security in Wireless Networks
8 20 min Monday 9 Session 2 14:30 - 16:30 Privacy and Confidentiality Planck PrivateWeb Search with Constant Round Efficiency
10 20 min Tuesday 10 Session 3 09:30 - 11:30 Data and Software Security Planck Evaluation of the Anonymous I2P Network’s Design Choices Against Performance and Security
11 30 min Tuesday 10 Session 3 09:30 - 11:30 Data and Software Security Planck Understanding Information Technology Security Standards Diffusion - An Institutional Perspective
12 30 min Tuesday 10 Session 3 09:30 - 11:30 Data and Software Security Einstein Malfinder: Accelerated Malware Classification System through Filtering on Manycore System
13 Poster Wednesday 11 Poster Session 2 16:15 - 17:15 Privacy and Confidentiality Foyer Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange
14 20 min Tuesday 10 Session 3 09:30 - 11:30 Data and Software Security Planck Assessing Information Security Risks of AMI - What Makes it so Difficult?
15 30 min Tuesday 10 Session 3 09:30 - 11:30 Privacy and Confidentiality Einstein Model-driven Privacy Assessment in the Smart Grid
17 20 min Monday 9 Session 2 14:30 - 16:30 Privacy and Confidentiality Planck Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice
18 20 min Wednesday 11 Session 5 09:30 - 11:00 Data and Software Security Planck Analyzing Quality Criteria in Role-based Identity and Access Management
21 Poster Monday 9 Poster Session 1 16:30 - 17:30 Privacy and Confidentiality Foyer Malware Classification Method Based on Sequence of Traffic Flow
22 20 min Wednesday 11 Session 7 14:45 - 16:15 Biometric Authentication Planck Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation
23 30 min Tuesday 10 Session 4 14:00 - 16:00 Mobile Systems Security Planck A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
24 30 min Monday 9 Session 1 12:00 - 13:15 Biometric Authentication Planck The Palm Vein Graph - Feature Extraction and Matching
25 20 min Wednesday 11 Session 6 11:15 - 12:15 Data and Software Security Planck A Novel Model of Security Policies and Requirements
26 30 min Tuesday 10 Session 4 14:00 - 16:00 Mobile Systems Security Planck Multi-sensor Authentication to Improve Smartphone Security
27 30 min Tuesday 10 Session 3 09:30 - 11:30 Privacy and Confidentiality Einstein A Scratch-based Graphical Policy Editor for XACML
28 30 min Monday 9 Session 1 12:00 - 13:15 Biometric Authentication Planck Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment
29 20 min Monday 9 Session 2 14:30 - 16:30 Data and Software Security Planck Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine
30 20 min Wednesday 11 Session 7 14:45 - 16:15 Biometric Authentication Planck The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition
32 20 min Wednesday 11 Session 7 14:45 - 16:15 Biometric Authentication Planck EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices
33 Poster Monday 9 Poster Session 1 16:30 - 17:30 Data and Software Security Foyer Clustering Spam Emails into Campaigns
34 20 min Tuesday 10 Session 4 14:00 - 16:00 Data and Software Security Planck On Detection of Bitcoin Mining Redirection Attacks
36 20 min Tuesday 10 Session 4 14:00 - 16:00 Data and Software Security Planck Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security
37 30 min Tuesday 10 Session 3 09:30 - 11:30 Data and Software Security Planck A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files
38 Poster Wednesday 11 Poster Session 2 16:15 - 17:15 Biometric Authentication Foyer Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features
39 Poster Wednesday 11 Poster Session 2 16:15 - 17:15 Data and Software Security Foyer Defeating DDoS using Productive Puzzles
42 Poster Monday 9 Poster Session 1 16:30 - 17:30 Privacy and Confidentiality Foyer Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation
44 20 min Tuesday 10 Session 4 14:00 - 16:00 Mobile Systems Security Planck On the Power Consumption of Cryptographic Processors in Civil Microdrones
45 Poster Wednesday 11 Poster Session 2 16:15 - 17:15 Data and Software Security Foyer HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption
47 30 min Tuesday 10 Session 3 09:30 - 11:30 Privacy and Confidentiality Einstein Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss
49 Poster Wednesday 11 Poster Session 2 16:15 - 17:15 Trust Foyer Filtering Unfair Users - A Hidden Markov Model Approach
50 Poster Monday 9 Poster Session 1 16:30 - 17:30 Privacy and Confidentiality Foyer Privacy and Security Concern of Online Social Networks from User Perspective
56 20 min Wednesday 11 Session 5 09:30 - 11:00 Trust Planck A Policy-based Communications Architecture for Vehicles
57 20 min Wednesday 11 Session 6 11:15 - 12:15 Data and Software Security Planck Modelling of Enterprise Insider Threats
58 20 min Wednesday 11 Session 6 11:15 - 12:15 Data and Software Security Planck ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC
60 20 min Wednesday 11 Session 5 09:30 - 11:00 Trust Planck Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research