SECrypt 2013 July 29, 2013 to July 31, 2013, Reykjavik, Iceland

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities Sushil Jajodia , Lingyu Wang , Anoop Singhal , Massimiliano Albanese N/A
Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing Ravi Jhawar , Vincenzo Piuri N/A
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves Daniel Slamanig , Christian Hanser N/A
Secure Second Price Auctions with a Rational Auctioneer Amir Herzberg , Boaz Catane N/A
iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments Peter Teufl , Thomas Zefferer , Christof Stromberger , Christoph Hechenblaikner N/A
Secure Computation of Hidden Markov Models Marina Blanton , Mehrdad Aliasgari N/A
A Security-enhanced Design Methodology for Embedded Systems Alberto Ferrante , Jelena Milosevic , Marija Janjušević N/A
HoneydV6: A Low-interaction IPv6 Honeypot Thomas Scheffler , Bettina Schnor , Sven Schindler , Simon Kiertscher , Eldad Zack N/A
REENACT: Augmented Reality and Collective Role Playing to Enhance the Pedagogy of Historical Events - An EXPERIMEDIA Experiment Martin Lopez-nores , Yolanda Blanco-fernandez , José J. Pazos-arias , Alberto Gil-solla , Jorge Garcia-duque , Manuel Ramos-cabrer N/A
A TV Commercial Retrieval System based on Audio Features Jose E. Borras , Jorge Igual , Carlos Fernandez-llatas , Vicente Traver N/A
Markerless Augmented Reality based on Local Binary Pattern Youssef Hbali , Mohamed Sadgal , Abdelaziz El Fazziki N/A
Determinants of Use Intensity in Social Networking Sites - A Cross-cultural Study of Korea and USA Cheol Park , Jongkun Jun , Thaemin Lee N/A
Strategic use of Twitter in Local Government - A Northern Ireland Study Maurice Mulvenna , Tiago Picão , Fiona Mcmahon , Valerie Purchase N/A
The Trust in Online Discussion Forums and How they Influence Patients' Intention to Adopt Medical Tourism Services Peter Ractham , Charlie Chen , Makoto Nakayama N/A
Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles Kazuki Yoneyama N/A
Keystroke Authentication with a Capacitive Display using Different Mobile Devices Matthias Trojahn , Christian Schadewald , Frank Ortmeier N/A
Simplified Computation of l2-Sensitivity for 1-D and a Class of 2-D State-Space Digital Filters Considering 0 and Yoichi Hinamoto , Akimitsu Doi N/A
A Parity-based Error Control Method for Distributed Compressive Video Sensing Shou-ning Chen , Bao-yu Zheng , Liang Zhou N/A
A Data-as-a-Service Framework for IoT Big Data Laurence T. Yang Internet of Things (IoT) has been widely used in our daily life. In the IoT, ...
IP-Oriented QoS and QoE in the Next Generation Networks - Application to Wireless Networks Pascal Lorenz Emerging Internet Quality of Service (QoS) mechanisms are expected to enable wide spread use of ...
The Smart Grid and the Internet should be Friends Donal O'mahony Over the years, computer networks have evolved from highly centralized, single purpose, inflexible entities into ...
Instantaneous Frequency Analysis David Naccache This paper investigated the use of instantaneous frequency (IF) instead of power amplitude and power ...
"ICT Technology for Smart Cities and Homes” Pierangela Samarati , Mohammad s. Obaidat , Laurence T. Yang , Pascal Lorenz , Donal O'mahony , Marten Van Sinderen N/A
A Novel Technique for TCP Based Congestion Control Martin Hruby , Michal Olsovsky , Margareta Kotocova N/A
Accommodating Individual Differences in Web based Instruction (WBI) and Implementation Rana A. Alhajri , Steve Counsell , Xiaohui Lui N/A
A Proposed Framework for Supporting Behaviour Change by Translating Personalised Activities into Measurable Benefits Maurice Mulvenna , Adrian Mccann , Maurice O'kane , Barry Henderson , Karen Kirby , Deirdre Mccay N/A
Applying Bayesian Parameter Estimation to A/B Tests in e-Business Applications - Examining the Impact of Green Marketing Signals in Sponsored Search Advertising Tobias Blask N/A
A Comparative Prediction Study of Housing Price Index based on Web Search Data - Evidence from Beijing and Lanzhou in China Bo Yong Wang , Xin Yang , Bian Wang , Benfu Lv N/A
Qsense - Learning Semantic Web Concepts by Querying DBpedia Andrei Panu , Sabin C. Buraga , Lenuta Alboaie N/A
Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis Jorge nakahara Jr , Daniel Freitas N/A
On the Connection between t-Closeness and Differential Privacy for Data Releases Josep Domingo-ferrer N/A
AVON - A Fast Hash Function for Intel SIMD Architectures Shinsaku Kiyomoto , Matt Henricksen N/A
Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs Jonny Milliken , Valerio Selis , Kian Meng Yap , Alan Marshall N/A
Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks Slim Trabelsi , Hana Bouafif N/A
Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication Boris Skoric , Joep De Groot , Niels De Vreede , Jean-paul Linnartz N/A
Multi-modal Bike Sensing for Automatic Geo-annotation - Geo-annotation of Road/Terrain Type by Participatory Bike-sensing Steven Verstockt , Viktor Slavkovikj , Pieterjan De Potter , Jürgen Slowack , Rik Walle N/A
SignalBIT - A Web-based Platform for Real-time Biosignal Bisualization and Recording Ana Priscila Alves , Hugo Silva , André Lourenço , Ana Fred N/A
Efficient Coupled PHY and MAC use of Physical Bursts by ARQ-Enabled Connections in IEEE 802.16e/WiMAX Networks Oran Sharon , Yaron Alpert , Amit Liron N/A
Energy Aware Routing in IEEE 802.11sWireless Mesh Networks Aggeliki Sgora , Maria Zogkou , Dimitrios D. Vergados N/A
On Providing Fair Performance in Adaptive Wireless Push Systems P. Nicopolitidis N/A
Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions - Position Paper Manuel Koschuch , Matthias Hudler , Zsolt Saffer N/A
e-Business Application to Students""'' Blended Learning in Higher Education Andreas Ahrens , Jelena Zaščerinska N/A
RFID based Data Mining for E-logistics Yi Wang , Quan Yu , Kesheng Wang N/A
The e-Visibility Maturity Model - Assessing Stages of Visibility Evolution for e-Business Olga Levina , Iris Vilnai-yavetz N/A
Preimage Attack on BioHashing Patrick Lacharme , Estelle Cherrier , Christophe Rosenberger N/A
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs Rolf Haynberg , Jochen Rill , Dirk Achenbach , Jörn Müller-quade N/A
Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme Jacques M. Bahi , Nicolas Friot , Christophe Guyeux N/A
Massive Group Message Authentication with Revocable Anonymity Amir Herzberg , Boaz Catane N/A
SVD-based Digital Image Watermarking on approximated Orthogonal Matrix Yevhen Zolotavkin , Martti Juhola N/A
LMM - A Common Component for Software License Management on Cloud Yuto Nakano , Shinsaku Kiyomoto , Yutaka Miyake , Andre Rein , Carsten Rudolph N/A
Redactable Signature Scheme for Tree-structured Data based on Merkle Tree Shoichi Hirose , Hidenori Kuwakado N/A
Data Model and Data Access Control Method on Service Platform for Smart Public Infrastructure Yohei Kawada , Kojin Yano , Yoshihiro Mizuno , Hirofumi Terada N/A
RestContext - A Service Framework for Context Retrieval Andreas Geyer-schulz , Leon O. Burkard , Andreas C. Sonnenbichler N/A
Integrating User-centred Design in an Early Stage of Mobile Medical Application Prototyping - A Case Study on Data Acquistion in Health Organisations Andreas Holzinger , Bernhard Peischl , Michaela Ferk N/A
Token-based Authentication for Smartphones - Position Paper Manuel Koschuch , Matthias Hudler , Zsolt Saffer , Hubert Eigner N/A
A New Approach for Detection of Host Identity in IPv6 Networks Petr Matousek , Libor Polcák , Martin Holkovič N/A
Resource-aware Virtualization for Industrial Networks - A Novel Architecture Combining Resource Management, Policy Control and Network Virtualization for Networks in Automation or Supervisory Control Hans-peter Huth , Amine M. Houyou N/A
Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks Hassane Aissaoui , Pascal Urien , Guy Pujolle N/A
Capacity Analysis of Heterogeneous Wireless Networks under SINR Interference Constraints W. Mansouri , K. Mnif , F. Zarai , M. S. Obaidat , L. Kamoun N/A
Modulation-mode and Power Assignment in SVD-assisted MIMO Systems with Transmitter-side Antennas Correlation Andreas Ahrens , Francisco Cano-broncano , César Benavente-peces N/A
A Data Cube Model for Surveillance Video Indexing and Retrieval Hansung Lee , Sohee Park , Jang-hee Yoo N/A
Towards Live Subtitling of TV Ice-hockey Commentary Josef v. Psutka , Aleš Pražák , Zdeněk Loose N/A
EFilter: An Efficient Filter for Supporting Twig Query Patterns in XML Streams Wen-chiao Hsu , Chia-fang Li , I-en Liao N/A
A Study on Construction of Inflation Index based on Web Search Data Chen Hang , Sun Yi , Yang Xin , Lv Benfu N/A
The Consideration of Organizational, Human and Corporate Cultural Factors in the Implementation of Business Process Management Projects - Social Factors to Prevent Failure of BPM Projects Rebecca Bulander , Matthias Dietel N/A
Optical Parametric Gain of Tellutire/Phosphate Highly Nonlinear Optical Fiber Edmund Samuel , Tong Hoang Tuan , Koji Asano , Takenobu Suzuki , Yasutake Ohishi N/A
Are BiometricWeb Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks Basie von Solms , Dustin Haar N/A
Identity Security in Biometric Systems based on Keystroking Wojciech Wodo , Lucjan Hanzlik N/A
Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications Vinay S. Iyengar N/A
Related-key Impossible Differential Cryptanalysis of Full-round HIGHT Saeed Rostami , Sadegh Bamohabbat Chafjiri , Seyed Tabatabaei N/A
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks Mickaël Cazorla , Kevin Marquet , Marine Minier N/A
Privacy-enhanced Perceptual Hashing of Audio Data Heiko Knospe N/A
Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration Lukas Malina , Jan Hajny , Zdenek Martinasek N/A
Database Anomalous Activities - Detection and Quantification Sandro Etalle , Milan Petkovic , Nicola Zannone , Elisa Costante , Sokratis Vavilis , Jerry Den Hartog N/A
Length of Phonemes in a Context of their Positions in Polish Sentences Magdalena Igras , Bartosz Ziółko , Mariusz Ziółko N/A
Fully Automatic Saliency-based Subjects Extraction in Digital Images Luca Greco , Marco La Cascia , Francesco Lo Cascio N/A
Design Approaches for Mode Decision in HEVC Encoder - Exploiting Parallelism at CTB Level Ramakrishna Adireddy , Suyash Ugare N/A
Tool Support for Building Graph Construction Paul Heiniz , Karl-heinz Krempels , Christian Samsel , Kai Schwarz , Gökay Bodur N/A
Some Synchronization Issues in OSPF Routing Anne Bouillard , Claude Jard , Aurore Junier N/A
HyVVE - A Voronoi based Hybrid Architecture for Massively Multiplayer On-line Games Laura Ricci , Luca Genovali , Barbara Guidi N/A
Evaluation of Video Transmission in Emergency Response Ad Hoc Networks C. Bouras , G. Kioumourtzis , A. Gkamas , V. Kapoulas , D. Tsanai N/A
An Interactive Evaluation Method of Decentralized Procurement Plan by Multi-Objective Genetic Algorithm Ryoji Kobayashi , Masakatsu Mori , Masaki Komoda N/A
Electronic Human Resource Management Strategies for Atypical Employment Volker Stein , Tobias M. Scholz N/A
A Distributed CTL Model Checker Laura Florentina Cacovean , Florian Mircea Boian , Florin Stoica N/A
Improving Block Cipher Design by Rearranging Internal Operations Liran Lerman , Jorge nakahara Jr , Nikita Veshchikov N/A
Towards Cryptographic Function Distinguishers with Evolutionary Circuits Vashek Matyas , Petr Svenda , Martin Ukrop N/A
Behavior-based Malware Analysis using Profile Hidden Markov Models Saradha Ravi , Balakrishnan N. , Bharath Venkatesh N/A
A Key-revocable Attribute-based Encryption for Mobile Cloud Environments Shinsaku Kiyomoto , Yutaka Miyake , Tsukasa Ishiguro N/A
Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control Vijay Varadharajan , Lan Zhou , Michael Hitchens N/A
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control Bo Lang , Runhua Xu , Yawei Duan N/A
Reliability Analysis of IEEE 802.11p Wireless Communication and Vehicle Safety Applications Unai Hernández-jayo , Idoia De-la-iglesia N/A
RealWorld Testing of Aggregation in Publish/Subscribe Systems Christoph Steup , Michael Schiefer , Jörg Kaiser N/A
VIMENO: A VirtualWireless Mesh Network Architecture for Operators Katarzyna Kosek-szott , Janusz Gozdecki , Krzysztof Loziak , Marek Natkaniec , Szymon Szott , Michal Wagrowski N/A
Continuous Improvement of Geographic Data Production Processes - Approach and Results of a Case Study Wolfgang Reinhardt , Thorsten Bockmühl N/A
Continuous Information Provisioning for the Conference Participation Process Paul Heiniz , Wolfgang Kluth , Karl-heinz Krempels , Christoph Terwelp , Stefan Wüller N/A
Increase of Travel Safety for Public Transport by Mobile Applications Wolfgang Kluth , Karl-heinz Krempels , Christoph Terwelp , Stefan Wüller N/A
Emerging Trends in Local Governments Web Strategies - Citizen Web Empowerment Assessment in Italy Elena Bellio , Luca Buccoliero N/A
The Development of ``BAU GIS'' Web/Program using Open Source MapWindow Samih al Rawashdeh , B. Sadoun , O. Al-bayari , J. Al-azizi N/A
Marketing and Fundraising through Mobile Phones - New Strategies for Non Profit Organizations and Charities Elena Bellio , Luca Buccoliero , Giorgio Fiorentini N/A
Dispersion Analysis within a Measured 1,4 km MIMO Multimode Channel Andreas Ahrens , Steffen Lochmann , Steffen Schroeder N/A
Optical Couplers in Multimode MIMO Transmission Systems - Measurement Results and Performance Analysis Steffen Lochmann , Andreas Ahrens N/A
Experimental Distribution of OFDM-UWB Radio Signals along Directly Modulated Long-reach Pons Indicated for Sparse Geographical Areas Tiago Alves , Adolfo Cartaxo N/A
InCC: Hiding Information By Mimicking Traffic In Network Flows Luis Campo Giralte , Cristina Conde , Isaac Diego , Enrique Cabello N/A
Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data Simone Bongiovanni , Giuseppe Scotti , Alessandro Trifiletti N/A
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model Sonia Belaid , Luk Bettale , Emmanuelle Dottax , Laurie Genelle , Franck Rondepierre N/A
A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software Ioannis Chionis , Maria Chroni , Stavros D. Nikolopoulos N/A
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL Yasuhide Sakai , Yu Sasaki , Lei Wang , Kazuo Sakiyama , Wataru Komatsubara , Mitsugu Iwamoto , Kazuo Ohta N/A
Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks E. Ciancamerla , M. Minichino , S. Palmieri N/A
Which Clicks Lead to Conversions? - Modeling User-journeys Across Multiple Types of Online Advertising Florian Nottorf N/A
Virtual Currency for Online Platforms - Business Model Implications Uschi Buchinger , Heritiana Ranaivoson , Pieter Ballon N/A
From e-Supply Chain Capability Generation to Information Technology Value Co-creation - A Perspective of e-Business Process Jing Zhao , Yi Jiang N/A
Estimating the Effort in the Development of Distance Learning Paths Milena Casagranda , Luigi Casagranda , Andrea Molinari N/A
Which Side Are You On? - A New Panopticon vs. Privacy Dimitris Gritzalis , Miltiadis Kandias , Lilian Mitrou , Vasilis Stavrou N/A
Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks Lukas Malina , Jan Hajny , Zdenek Martinasek , Vaclav Zeman N/A
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction Goichiro Hanaoka , Go Ohtake , Yuki Hironaka , Kenjiro Kai , Yosuke Endo , Hajime Watanabe , Shota Yamada , Kouhei Kasamatsu , Takashi Yamakawa , Hideki Imai N/A
Privacy-preserving Realization of the STORK Framework in the Public Cloud Daniel Slamanig , Bernd Zwattendorfer N/A
Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE Michael Clear , Ciarán Mcgoldrick N/A
Secure Alert Tracking in Supply Chain Refik Molva , Mehdi Khalfaoui , Laurent Gomez N/A
Dynamic Proofs of Retrievability from Chameleon-Hashes Stefan Rass N/A
An Efficient and Provably Secure Certificateless Identification Scheme Ji-jian Chin , Raphael C.-w. Phan , Rouzbeh Behnia , Swee-huay Heng N/A
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting Clémentine Maurice , Stéphane Onno , Christoph Neumann , Olivier Heen , Aurélien Francillon N/A
A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities Maider Huarte , Iñaki Goirizelaia , Juan José Unzilla , Jon Matías , Juan J. Igarza N/A
Optimization of Free Viewpoint Interpolation by Applying Adaptive Depth Plane Distributions in Plane Sweeping - A Histogram-based Approach to a Non-uniform Plane Distribution Patrik Goorts , Sammy Rogmans , Philippe Bekaert , Steven Maesen , Maarten Dumont N/A
Multi-Point Measurement System and Data Processing for Earthquakes Monitoring Valery Korepanov , Fedir Dudkin N/A
Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image Isao Echizen , Seiichi Gohshi N/A
A Linearvibrotactile Actuator for Mobile Devices Sang-youn Kim , Bonggoo Kim , Tae-heon Yang N/A
A Fast and Efficient Inter Mode Decision Algorithm for the H.264/AVC Video Coding Standard Skoudarli Abdellah , Nibouche Mokhtar , Serir Amina N/A
The Influence of Virtualization of Resources Acquisition Processes on the Enterprises Competitiveness Dorota Jelonek , Cezary Stepniak , Tomasz Turek , Leszek Ziora N/A
The Concept of Building Regional Business Spatial Community Dorota Jelonek , Cezary Stepniak , Tomasz Turek N/A
Proposed Use of Sharepoint to Improve New Employee In-processing Tyna Webber , Wai Yin Mok , Kit Yee Cheung N/A
Public-key Cryptography from Different Assumptions - A Multi-bit Version Alain Patey , Herve Chabanne , Gerard Cohen N/A
Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs Z. Cliffe Schreuders , Adil M. Bhat N/A
Approaching Encryption through Complex Number Logarithms Dimitris Gritzalis , Miltiadis Kandias , George Stergiopoulos N/A
MINHO - A Novel Authentication Scheme based on Pre-Authentication Service Hasan Kadhem N/A
A Model-driven Approach for Securing Software Architectures Stefano Paraboschi , Mario Arrigoni Neri , Marco Guarnieri , Eros Magri , Simone Mutti N/A
A Preliminary Application of Generalized Fault Trees to Security Daniele Codetta-raiteri N/A
E3SN - Efficient Security Scheme for Sensor Networks Hassan Noura , Steven Martin , Khaldoun Al Agha N/A
An Unsupervised Ensemble-based Markov Random Field Approach to Microscope Cell Image Segmentation Bálint Antal , Bence Remenyik , András Hajdu N/A
SAO Filtering inside CTU Loop for High Efficiency Video Coding Adireddy Ramakrishna , N. S. Prashanth , G. B. Praveen N/A
Moving Object Classifier based on UWB Radar Signal Chong Hyun Lee , Youn Joung Kang , Jinho Bae , Seung Wook Lee , Jungchae Shin , Jin Woo Jung N/A
Prediction of Spectrum based on Improved RBF Neural Network in Cognitive Radio Shibing Zhang , Jinming Hu , Zhihua Bao , Jianrong Wu N/A
On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers Ruth Ng Ii-yung , Raphael C.-w. Phan , Khoongming Khoo N/A
Enhanced Truncated Differential Cryptanalysis of GOST Theodosis Mourouzis , Nicolas T. Courtois , Michal Misztal N/A
From a Logical Approach to Internal States of Hash Functions Florian Legendre , Gilles Dequen , Michaël Krajecki N/A
Recovering RSA Private Keys on Implementations with Tampered LSBs Constantinos Patsakis N/A
Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones Peter Teufl , Thomas Zefferer N/A
Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components Sébastien Salva , Stassia R. Zafimiharisoa , Patrice Laurençot N/A
Instance-based Anomaly Method for Android Malware Detection Borja Sanz , Igor Santos , Xabier Ugarte-pedrero , Carlos Laorden , Javier Nieves , Pablo G. Bringas N/A
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices Mohamed-ali Kaafar , Golam Sarwar , Olivier Mehani , Roksana Boreli N/A
Self-formable Optical Interconnection for Selective Transmission of Frequent Signals Mitsunori Saito , Kohei Sakiyama , Tatsuya Nishimura N/A
Automatic Attendance Rating of Movie Content using Bag of Audio Words Representation Avi Bleiweiss N/A
Resource-aware Virtualization for Industrial Networks - Hans-peter Huth , Amine M. Houyou
Improving the Performance of Speaker Verification Systems under Noisy Conditions using Low Level Features and Score Level Fusion Nassim Asbai , Messaoud Bengherabi , Farid Harizi , Abderrahmane Amrouche N/A