09:00 - 10:30 - Room M102 Parallel Session 2A - DCNET
  • 7: Some Synchronization Issues in OSPF Routing Anne Bouillard, Claude Jard and Aurore Junier
  • 12: HyVVE - A Voronoi based Hybrid Architecture for Massively Multiplayer On-line Games Laura Ricci, Luca Genovali and Barbara Guidi
  • 4: Evaluation of Video Transmission in Emergency Response Ad Hoc Networks C. Bouras, G. Kioumourtzis, A. Gkamas, V. Kapoulas, D. Politaki and E. Tsanai
09:00 - 10:30 - Room M209 Parallel Session 2A - ICE-B
  • 24: An Interactive Evaluation Method of Decentralized Procurement Plan by Multi-Objective Genetic Algorithm Ryoji Kobayashi, Masakatsu Mori, Masaki Samejima and Norihisa Komoda
  • 10: Electronic Human Resource Management Strategies for Atypical Employment Volker Stein and Tobias M. Scholz
  • 33: A Distributed CTL Model Checker Laura Florentina Cacovean, Florian Mircea Boian and Florin Stoica
09:00 - 10:30 - Room M201 Parallel Session 2A - SECRYPT
  • 16: Improving Block Cipher Design by Rearranging Internal Operations Liran Lerman, Jorge Nakahara Jr and Nikita Veshchikov
  • 67: Towards Cryptographic Function Distinguishers with Evolutionary Circuits Petr Svenda, Martin Ukrop and Vashek Matyas
  • 88: Behavior-based Malware Analysis using Profile Hidden Markov Models Saradha Ravi, Balakrishnan N. and Bharath Venkatesh
09:00 - 10:30 - Room V201 Parallel Session 2B - SECRYPT
  • 32: A Key-revocable Attribute-based Encryption for Mobile Cloud Environments Tsukasa Ishiguro, Shinsaku Kiyomoto and Yutaka Miyake
  • 42: Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control Lan Zhou, Vijay Varadharajan and Michael Hitchens
  • 76: Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control Bo Lang, Runhua Xu and Yawei Duan
09:00 - 10:30 - Room M208 Parallel Session 2A - WINSYS
  • 2: Reliability Analysis of IEEE 802.11p Wireless Communication and Vehicle Safety Applications Unai Hernández-Jayo and Idoia De-la-Iglesia
  • 24: RealWorld Testing of Aggregation in Publish/Subscribe Systems Michael Schiefer, Christoph Steup and Jörg Kaiser
  • 26: VIMENO: A VirtualWireless Mesh Network Architecture for Operators Katarzyna Kosek-Szott, Janusz Gozdecki, Krzysztof Loziak, Marek Natkaniec, Szymon Szott and Michal Wagrowski
10:30 Coffee-Break (10:30 - 10:45)
10:45 - 12:15 - Room M209 Parallel Session 3A - ICE-B
  • 40: Continuous Improvement of Geographic Data Production Processes - Approach and Results of a Case Study Wolfgang Reinhardt and Thorsten Bockmühl
  • 54: Continuous Information Provisioning for the Conference Participation Process Paul Heiniz, Wolfgang Kluth, Karl-Heinz Krempels, Christoph Terwelp and Stefan Wüller
  • 56: Increase of Travel Safety for Public Transport by Mobile Applications Wolfgang Kluth, Karl-Heinz Krempels, Christoph Terwelp and Stefan Wüller
10:45 - 12:15 - Room M208 Parallel Session 3B - ICE-B
  • 38: Emerging Trends in Local Governments Web Strategies - Citizen Web Empowerment Assessment in Italy Elena Bellio and Luca Buccoliero
  • 55: The Development of ``BAU GIS'' Web/Program using Open Source MapWindow B. Sadoun, O. Al-Bayari, J. Al-Azizi and Samih B. Al Rawashdeh
  • 35: Marketing and Fundraising through Mobile Phones - New Strategies for Non Profit Organizations and Charities Elena Bellio, Luca Buccoliero and Giorgio Fiorentini
10:45 - 12:15 - Room M102 Parallel Session 3A - OPTICS
  • 2: Dispersion Analysis within a Measured 1,4 km MIMO Multimode Channel Andreas Ahrens, Steffen Schroeder and Steffen Lochmann
  • 3: Optical Couplers in Multimode MIMO Transmission Systems - Measurement Results and Performance Analysis Andreas Ahrens and Steffen Lochmann
  • 11: Experimental Distribution of OFDM-UWB Radio Signals along Directly Modulated Long-reach Pons Indicated for Sparse Geographical Areas Tiago M. F. Alves Alves and Adolfo V. T. Cartaxo
10:45 - 12:15 - Room M201 Parallel Session 3A - SECRYPT
  • 8: InCC: Hiding Information By Mimicking Traffic In Network Flows Luis Campo Giralte, Cristina Conde, Isaac Martin De Diego and Enrique Cabello
  • 81: Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data Simone Bongiovanni, Giuseppe Scotti and Alessandro Trifiletti
  • 112: Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle and Franck Rondepierre
10:45 - 12:15 - Room V201 Parallel Session 3B - SECRYPT
  • 49: A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software Ioannis Chionis, Maria Chroni and Stavros D. Nikolopoulos
  • 61: Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama and Kazuo Ohta
  • 66: Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks E. Ciancamerla, M. Minichino and S. Palmieri
12:15 - 13:15 - Room M101 The Smart Grid and the Internet should be friends Keynote Speaker: Donal O'Mahony
13:15 Lunch (13:15 - 14:30)
14:30 - 16:30 - Room M209 Parallel Session 4A - ICE-B
  • 19: Which Clicks Lead to Conversions? - Modeling User-journeys Across Multiple Types of Online Advertising Florian Nottorf
  • 22: Virtual Currency for Online Platforms - Business Model Implications Uschi Buchinger, Heritiana Ranaivoson and Pieter Ballon
  • 41: From e-Supply Chain Capability Generation to Information Technology Value Co-creation - A Perspective of e-Business Process Jing Zhao and Yi Jiang
  • 45: Estimating the Effort in the Development of Distance Learning Paths Milena Casagranda, Luigi Casagranda and Andrea Molinari
14:30 - 16:30 - Room V201 Parallel Session 4A - SECRYPT
  • 60: Which Side Are You On? - A New Panopticon vs. Privacy Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou and Dimitris Gritzalis
  • 19: Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks Jan Hajny, Lukas Malina, Zdenek Martinasek and Vaclav Zeman
  • 47: Partially Wildcarded Attribute-based Encryption and Its Efficient Construction Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kouhei Kasamatsu, Takashi Yamakawa and Hideki Imai
  • 116: Privacy-preserving Realization of the STORK Framework in the Public Cloud Bernd Zwattendorfer and Daniel Slamanig
  • 122: Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE Michael Clear and Ciarán McGoldrick
14:30 - 16:30 - Room M201 Parallel Session 4B - SECRYPT
  • 107: Secure Alert Tracking in Supply Chain Mehdi Khalfaoui, Refik Molva and Laurent Gomez
  • 31: Dynamic Proofs of Retrievability from Chameleon-Hashes Stefan Rass
  • 79: An Efficient and Provably Secure Certificateless Identification Scheme Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia and Swee-Huay Heng
  • 93: Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen and Aurélien Francillon
  • 96: A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías and Juan J. Igarza
14:30 - 16:30 - Room M208 Parallel Session 4A - SIGMAP
  • 27: Optimization of Free Viewpoint Interpolation by Applying Adaptive Depth Plane Distributions in Plane Sweeping - A Histogram-based Approach to a Non-uniform Plane Distribution Patrik Goorts, Steven Maesen, Maarten Dumont, Sammy Rogmans and Philippe Bekaert
  • 30: Improving the Performance of Speaker Verification Systems under Noisy Conditions using Low Level Features and Score Level Fusion Nassim Asbai, Messaoud Bengherabi, Farid Harizi and Abderrahmane Amrouche
  • 18: Multi-Point Measurement System and Data Processing for Earthquakes Monitoring Valery Korepanov and Fedir Dudkin
  • 25: Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image Seiichi Gohshi and Isao Echizen
  • 29: A Linearvibrotactile Actuator for Mobile Devices Sang-Youn Kim, Bonggoo Kim and Tae-Heon Yang
16:30 - 17:30 - Sólin Posters Session 3
  • 32: The Influence of Virtualization of Resources Acquisition Processes on the Enterprises Competitiveness Dorota Jelonek, Cezary Stepniak, Tomasz Turek and Leszek Ziora
  • 42: The Concept of Building Regional Business Spatial Community Dorota Jelonek, Cezary Stepniak and Tomasz Turek
  • 47: Proposed Use of Sharepoint to Improve New Employee In-processing Tyna Webber, Wai Yin Mok and Kit Yee Cheung
  • 138: Public-key Cryptography from Different Assumptions - A Multi-bit Version Herve Chabanne, Gerard Cohen and Alain Patey
  • 139: Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs Z. Cliffe Schreuders and Adil M. Bhat
  • 140: Approaching Encryption through Complex Number Logarithms George Stergiopoulos, Miltiadis Kandias and Dimitris Gritzalis
  • 151: MINHO - A Novel Authentication Scheme based on Pre-Authentication Service Hasan Kadhem
  • 157: A Model-driven Approach for Securing Software Architectures Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti and Stefano Paraboschi
  • 163: A Preliminary Application of Generalized Fault Trees to Security Daniele Codetta-Raiteri
  • 164: E3SN - Efficient Security Scheme for Sensor Networks Hassan Noura, Steven Martin and Khaldoun Al Agha
  • 45: An Unsupervised Ensemble-based Markov Random Field Approach to Microscope Cell Image Segmentation Bálint Antal, Bence Remenyik and András Hajdu
  • 46: SAO Filtering inside CTU Loop for High Efficiency Video Coding Adireddy Ramakrishna, N. S. Prashanth and G. B. Praveen
  • 9: Moving Object Classifier based on UWB Radar Signal Chong Hyun Lee, Youn Joung Kang, Jinho Bae, Seung Wook Lee, Jungchae Shin and Jin Woo Jung
  • 28: Prediction of Spectrum based on Improved RBF Neural Network in Cognitive Radio Shibing Zhang, Jinming Hu, Zhihua Bao and Jianrong Wu
16:45 Coffee-Break (16:45 - 17:00)