Title |
Speakers |
Summary |
Topic Types |
Keynote 1: Access Control Evolution and Prospects |
Ravi Sandhu
|
N/A |
|
Crypto and Encryption |
Fengjun Li
,
Anirudh Narasimman
,
Qiaozhi Wang
,
Dongwon Lee
,
And Bo Luo
|
N/A |
|
BlockTag: Design and Applications of a Tagging System for Blockchain Analysis |
Yazan Boshmaf
,
Husam Al Jawaheri
,
And Sabah
|
N/A |
|
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data |
Laurent Gomez
,
Lorenzo Frigerio
,
Anderson Oliveira
,
And Patrick Duverger
|
N/A |
|
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment |
Majid Hatamian
,
Sebastian Rannenberg
|
N/A |
|
SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications |
Wenjuan Li
,
Weizhi Meng
,
Lijun Jiang
,
And Jianying Zhou
|
N/A |
|
Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model |
Ali Farooq
,
Debora Jeske
,
And Jouni Isoaho
|
N/A |
|
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym |
David Harborth
,
Xinyuan Cai
,
And Sebastian Pape
|
N/A |
|
Towards Contractual Agreements for Revocation of Online Data |
Markus Dürmuth
,
Theodor Schnitzler
,
And Christina Pöpper
|
N/A |
|
Physical presence verification using TOTP and QR codes |
Emin Seigneur
|
N/A |
|
An Authentication and Key Agreement Scheme using ECQV in IoT Environments |
Dae-hwi Lee
|
N/A |
|
Efficiently Vectorized Anonymization in Data Mining using Genetic Algorithms |
Gerald Quirchmayr
,
Peter Kieseberg
,
Fatemeh Amiri
,
Alessio Weippl
|
N/A |
|
Access Control Models via Non-Standard Logics |
Mikhail A.
|
N/A |
|
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques |
Sarwar Marco-gisbert
|
N/A |
|
Automatically Proving Purpose Limitation in Software Architectures |
Hannes Federrath
,
Tobias Mueller
,
Kai Bavendiek
,
Florian Wittner
,
Thea Schwaneberg
,
Christian-alexander Behrendt
,
Wolfgang Schulz
,
And Sibylle Schupp
|
N/A |
|
Commit Signatures for Centralized Version Control Systems (Extended Abstract) |
Reza Curtmola
,
Santiago Torres-arias
,
Sangat Vaidya
,
And Justin Cappos
|
N/A |
|
A Short-cycle Framework Approach to Integrating Psychometric Feedback and Data Analytics to Rapid Cyber Defense |
Erik Moore
,
Steve Fulton
,
Roberta Mancuso
,
Tristen Likarish
|
N/A |
|
Identifying Security Requirements Body of Knowledge for the Security Systems Engineer |
Sune Marnewick
|
N/A |
|
Introducing Research into the Undergraduate Curriculum in Cybersecurity |
Susanne Damopoulos
|
N/A |
|
Compliance vs. Risk Management - Two Perspectives on Supply Chain Risk Management |
Rob Arnold
|
N/A |
|
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies |
Hassan Takabi
,
Manar Alohaly
,
And Eduardo Blanco
|
N/A |
|
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications |
Eric Totel
,
David Lanoë
,
Michel Hurfin
,
And Carlos Maziero
|
N/A |
|
A Structured Comparison of the Corporate Information Security Maturity Level |
Michael Pape
|
N/A |
|
Privacy by Design using Agents and Sovereign Identities |
Kalman Anderson-priddy
|
N/A |
|
ID-Based Proxy Re-encryption for Collusion Resistance in Cloud Storage |
Won-bin Lee
|
N/A |
|
A Machine Learning Framework for Studying User Behaviors in Phishing Email Processing |
Yi Li
,
Kaiqi Li
|
N/A |
|
On the Administrative Information Security: definition and impact on Security Governance |
Gurpreet Picoto
|
N/A |
|
Learning Principles and the Secure Programming Clinic |
Matt Bishop
,
Melissa Dark
,
Lynn Niekerk
|
N/A |
|
Light Cryptography |
Takaaki Mizuki
,
Pascal Lafourcade
,
Atsuki Shinagawa
|
N/A |
|
An Educational Intervention for Teaching Secure Coding Practices |
Lynn Niekerk
,
Vuyolwethu Mdunyelwa
|
N/A |
|
Performance of Password Guessing Enumerators Under Cracking Conditions |
Patrick Lacharme
,
Mathieu Valois
,
And Bars
|
N/A |
|
An Offline Dictionary Attack against zkPAKE Protocol |
José Becerra
,
Peter Ryan
,
Petra Sala
,
And Marjan Skrobot
|
N/A |
|
Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption |
Dominik Ziegler
,
Josef Sabongui
,
And Gerald Palfinger
|
N/A |
|
Lessons Learned from an Organizational Information Security Awareness Campaign |
Jacques Scrimgeour
|
N/A |
|
A Comprehensive Framework for Understanding Security Culture in Organizations |
Alaa Tolah
,
Steven Papadaki
|
N/A |
|
Using Gamification to Improve Information Security Behavior: A Password Strength Experiment |
Jacques Dietz
|
N/A |
|
Forward Secure Identity-based Signature Scheme with RSA |
Hankyung Ko
,
Gweonho Jeong
,
Jongho Kim
,
Jihye Oh
|
N/A |
|
Removing Problems in Rule-Based Policies |
Zheng Cheng
,
Jean-claude Royer
,
And Massimo Tisi
|
N/A |
|
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild |
Luigi Lo Iacono
,
Stephan Wiefling
,
And Markus Dürmuth
|
N/A |
|
Andragogy as a Scientific Basis for Training Professionals in Information Security |
Alexander Miloslavskaya
|
N/A |
|
Identifying Information Security Risks in a Social Network using Self-organising Map |
Rudi Serfontein
,
Hennie Drevin
|
N/A |
|
Blockchain and its Security: Ignore or Insert into Academic Training? |
Natalia Tolstoy
|
N/A |
|
Control Logic Injection Attacks on Industrial Control Systems |
Hyunguk Ahmed
|
N/A |
|
Addressing the Graduate Student Pipeline Problem in Cybersecurity |
Susanne Wetzel
|
N/A |
|
Integrating Blockchain into Security Curricula |
Kane Smith
|
N/A |
|
App Users Privacy and Personal Data Protection |
Solomon Meso
|
N/A |
|
A theoretical study and review on Blockchain's Privacy Mechanisms |
Adam Crainicu
|
N/A |
|
WHOIS and the GDPR - A (never) ending story in cyberspace? |
Matthias Hudobnik
|
N/A |
|
Soter: Trust Discovery Framework for Internet of Medical Things (IoMT) |
Maha Khan
|
N/A |
|