2 |
Poster |
Monday 9 |
Poster Session 1 |
16:30 - 17:30 |
Data and Software Security |
Foyer |
Optimizing Cryptographically based Security in Wireless Networks |
8 |
20 min |
Monday 9 |
Session 2 |
14:30 - 16:30 |
Privacy and Confidentiality |
Planck |
PrivateWeb Search with Constant Round Efficiency |
10 |
20 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Data and Software Security |
Planck |
Evaluation of the Anonymous I2P Network’s Design Choices Against Performance and Security |
11 |
30 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Data and Software Security |
Planck |
Understanding Information Technology Security Standards Diffusion - An Institutional Perspective |
12 |
30 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Data and Software Security |
Einstein |
Malfinder: Accelerated Malware Classification System through Filtering on Manycore System |
13 |
Poster |
Wednesday 11 |
Poster Session 2 |
16:15 - 17:15 |
Privacy and Confidentiality |
Foyer |
Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange |
14 |
20 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Data and Software Security |
Planck |
Assessing Information Security Risks of AMI - What Makes it so Difficult? |
15 |
30 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Privacy and Confidentiality |
Einstein |
Model-driven Privacy Assessment in the Smart Grid |
17 |
20 min |
Monday 9 |
Session 2 |
14:30 - 16:30 |
Privacy and Confidentiality |
Planck |
Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice |
18 |
20 min |
Wednesday 11 |
Session 5 |
09:30 - 11:00 |
Data and Software Security |
Planck |
Analyzing Quality Criteria in Role-based Identity and Access Management |
21 |
Poster |
Monday 9 |
Poster Session 1 |
16:30 - 17:30 |
Privacy and Confidentiality |
Foyer |
Malware Classification Method Based on Sequence of Traffic Flow |
22 |
20 min |
Wednesday 11 |
Session 7 |
14:45 - 16:15 |
Biometric Authentication |
Planck |
Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation |
23 |
30 min |
Tuesday 10 |
Session 4 |
14:00 - 16:00 |
Mobile Systems Security |
Planck |
A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks |
24 |
30 min |
Monday 9 |
Session 1 |
12:00 - 13:15 |
Biometric Authentication |
Planck |
The Palm Vein Graph - Feature Extraction and Matching |
25 |
20 min |
Wednesday 11 |
Session 6 |
11:15 - 12:15 |
Data and Software Security |
Planck |
A Novel Model of Security Policies and Requirements |
26 |
30 min |
Tuesday 10 |
Session 4 |
14:00 - 16:00 |
Mobile Systems Security |
Planck |
Multi-sensor Authentication to Improve Smartphone Security |
27 |
30 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Privacy and Confidentiality |
Einstein |
A Scratch-based Graphical Policy Editor for XACML |
28 |
30 min |
Monday 9 |
Session 1 |
12:00 - 13:15 |
Biometric Authentication |
Planck |
Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment |
29 |
20 min |
Monday 9 |
Session 2 |
14:30 - 16:30 |
Data and Software Security |
Planck |
Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine |
30 |
20 min |
Wednesday 11 |
Session 7 |
14:45 - 16:15 |
Biometric Authentication |
Planck |
The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition |
32 |
20 min |
Wednesday 11 |
Session 7 |
14:45 - 16:15 |
Biometric Authentication |
Planck |
EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices |
33 |
Poster |
Monday 9 |
Poster Session 1 |
16:30 - 17:30 |
Data and Software Security |
Foyer |
Clustering Spam Emails into Campaigns |
34 |
20 min |
Tuesday 10 |
Session 4 |
14:00 - 16:00 |
Data and Software Security |
Planck |
On Detection of Bitcoin Mining Redirection Attacks |
36 |
20 min |
Tuesday 10 |
Session 4 |
14:00 - 16:00 |
Data and Software Security |
Planck |
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security |
37 |
30 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Data and Software Security |
Planck |
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files |
38 |
Poster |
Wednesday 11 |
Poster Session 2 |
16:15 - 17:15 |
Biometric Authentication |
Foyer |
Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features |
39 |
Poster |
Wednesday 11 |
Poster Session 2 |
16:15 - 17:15 |
Data and Software Security |
Foyer |
Defeating DDoS using Productive Puzzles |
42 |
Poster |
Monday 9 |
Poster Session 1 |
16:30 - 17:30 |
Privacy and Confidentiality |
Foyer |
Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation |
44 |
20 min |
Tuesday 10 |
Session 4 |
14:00 - 16:00 |
Mobile Systems Security |
Planck |
On the Power Consumption of Cryptographic Processors in Civil Microdrones |
45 |
Poster |
Wednesday 11 |
Poster Session 2 |
16:15 - 17:15 |
Data and Software Security |
Foyer |
HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption |
47 |
30 min |
Tuesday 10 |
Session 3 |
09:30 - 11:30 |
Privacy and Confidentiality |
Einstein |
Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss |
49 |
Poster |
Wednesday 11 |
Poster Session 2 |
16:15 - 17:15 |
Trust |
Foyer |
Filtering Unfair Users - A Hidden Markov Model Approach |
50 |
Poster |
Monday 9 |
Poster Session 1 |
16:30 - 17:30 |
Privacy and Confidentiality |
Foyer |
Privacy and Security Concern of Online Social Networks from User Perspective |
56 |
20 min |
Wednesday 11 |
Session 5 |
09:30 - 11:00 |
Trust |
Planck |
A Policy-based Communications Architecture for Vehicles |
57 |
20 min |
Wednesday 11 |
Session 6 |
11:15 - 12:15 |
Data and Software Security |
Planck |
Modelling of Enterprise Insider Threats |
58 |
20 min |
Wednesday 11 |
Session 6 |
11:15 - 12:15 |
Data and Software Security |
Planck |
ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC |
60 |
20 min |
Wednesday 11 |
Session 5 |
09:30 - 11:00 |
Trust |
Planck |
Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research |