08:30 Welcome Desk & Registration (08:30 - 18:30)
09:30 - 09:45 - Room Hörsaal FH 5 Opening Session
09:45 - 11:15 - Room Hörsaal FH 5 Panel

"Recent Advances in Smart Cities"

Chairs and Moderators:
Mohammad S. Obaidat, Monmouth University, NJ, United States
Pascal Lorenz, University of Haute Alsace, France

Pascal Lorenz, University of Haute Alsace, France
Seymour Goodman, Georgia Institute of Technology, USA
Ivona Brandić, Vienna University of Technology, Austria
11:15 Coffee-Break (11:15 - 12:00)
11:15 - 12:15 - Studierraum Posters Session 1
  • 9: An Efficient Lightweight Security Algorithm for Random Linear Network Coding Hassan Noura, Steven Martin and Khaldoun Al Agha
  • 23: Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine Adriana-Cristina Enache and Valentin Sgârciu
  • 51: On Privacy Protection in the Internet Surveillance Era Dijana Vukovic, Danilo Gligoroski and Zoran Djuric
  • 53: Framework for Securing Data in Cloud Storage Services Mai Dahshan and Sherif Elkassas
  • 91: Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA Shizra Sultan, Abdul Ghafoor Abbasi, Awais Shibli and Ali Nasir
  • 96: A Cryptographic Study of Tokenization Systems Sandra Díaz-Santiago, Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
  • 98: Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon Nicolas Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad and Petr Susil
  • 114: Software and Hardware Certification Techniques in a Combined Certification Model Antonio Muñoz and Antonio Maña
  • 117: Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal Amir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov and Oleg N. Sherstyukov
  • 118: Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper Daniel Kavan, Klára Škodová and Martin Klíma
  • 119: Could Bitcoin Transactions Be 100x Faster? Nicolas T. Courtois, Pinar Emirdag and Daniel A. Nagy
  • 121: Using Bitmaps for Executing Range Queries in Encrypted Databases Lil María Rodríguez-Henríquez and Debrup Chakraborty
  • 122: Differential Fault Attacks against AES Tampering with the Instruction Flow Silvia Mella, Filippo Melzani and Andrea Visconti
  • 126: COGITO: Code Polymorphism to Secure Devices Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon and Philippe Lalevée
  • 137: QR Steganography - A Threat to New Generation Electronic Voting Systems Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas and Víctor Acín
  • 13: Receiver Design for an Optical MIMO Testbed Heidi Köhnke, Robert Schwinkendorf, Sebastian Daase, Andreas Ahrens and Steffen Lochmann
  • 17: Research of Cable Identification Method Based on Single Fiber Qiang Sun and Qifu Wu
  • 22: Delay-Aware Dynamic Wavelength Bandwidth Allocation in Time- and Wavelength-Division-Multiplexed Passive Optical Network Junsu Kim, Yong-Kyu Choi, Han Hyub Lee and Chang-Soo Park
  • 26: Mid-Infrared Supercontinuum Generation in an AsSe2-As2S5 Hybrid Microstructured Optical Fiber Tonglei Cheng, Yasuhire Kanou, Dinghuan Deng, Xiaojie Xue, Morio Matsumoto, Takashi Misumi, Takenobu Suzuki and Yasutake Ohishi
  • 18: Methods and Algorithms of Cluster Analysis in the Mining Industry - Solution of Tasks for Mineral Rocks Recognition Olga Baklanova and Olga Ya Shvets
  • 23: Hierarchical Optimization Using Hierarchical Multi-competitive Genetic Algorithm and its Application to Multiple Vehicle Routing Problem Shudai Ishikawa, Ryosuke Kubota and Keiichi Horio
  • 44: Auditory Features Analysis for BIC-based Audio Segmentation Tomasz Maka
  • 59: Voice Morphing Based on Spectral Features and Prosodic Modification Abdul Qavi, Shoab Ahmed Khan and Kashif Basir
  • 66: Image Denoising Algorithm with a Three-dimensional Grid System of Coupled Nonlinear Elements Atsushi Nomura, Yoshiki Mizukami and Koichi Okada
  • 70: Smoothed Surface Transitions for Human Motion Synthesis Ashish Doshi
12:15 - 13:15 - Room Hörsaal FH 2 Parallel Session 1 - OPTICS
  • 14: Equalisation of Measured Optical MIMO Channels André Sandmann, Andreas Ahrens and Steffen Lochmann
  • 18: On the Impact of the Clipping Techniques on the Performance of Optical OFDM João Guerreiro, Rui Dinis and Paulo Montezuma
12:15 - 13:15 - Room Hörsaal FH 3 Parallel Session 1 - ICE-B
  • 23: Decision Support and Online Advertising - Development and Empirical Testing of a Data Landscape Thomas Hansmann and Florian Nottorf
  • 30: A Resource-aware Simulation Tool for Business Processes Vincenzo Cartelli, Giuseppe Di Modica and Orazio Tomarchio
12:15 - 13:15 - Room Hörsaal FH 4 Parallel Session 1 - WINSYS
  • 21: Assessing the Cooperativeness of Users in Wi-Fi Networks Szymon Szott, Grzegorz Ptaszek and Lucjan Janowski
  • 22: Impact of the IEEE 802.11aa Intra-AC Prioritization on QoE for H.264 Compression Katarzyna Kosek-Szott, Marek Natkaniec, Lukasz Prasnal and Lucjan Janowski
  • 23: Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations Imen El Bouabidi, Salima Smaoui, Faouzi Zarai, Mohammad S. Obaidat and Lotfi Kamoun
12:15 - 13:15 - Room Seminarraum 101 A Parallel Session 1 - SIGMAP
  • 16: A Multi-Threaded Full-feature HEVC Encoder Based on Wavefront Parallel Processing Stefan Radicke, Jens-Uwe Hahn, Christos Grecos and Qi Wang
  • 57: Visual Attention in Edited Dynamical Images Ulrich Ansorge, Shelley Buchinger, Christian Valuch, Aniello Raffaele Patrone and Otmar Scherzer
12:15 - 13:15 - Room Hörsaal FH 7 Parallel Session 1 - SECRYPT
  • 69: A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme Francesco Buccafurri and Gianluca Lax
  • 86: Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization Pratik Poddar, Achin Bansal and Bernard Menezes
  • 90: Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers Frederik Armknecht and Vasily Mikhalev
12:15 - 13:15 - Room Seminarraum 325/2 Parallel Session 1 - MUSESUAN
  • 3: MOSAIC - Multimodal Analytics for the Protection of Critical Assets Atta Badii, Marco Tiemann, Richard Adderley, Patrick Seidler, Rubén Heras Evangelio, Tobias Senst, Thomas Sikora, Luca Panattoni, Matteo Raffaelli, Matthew Cappel-Porter, Zsolt L. Husz, Thomas Hecker and Ines Peters
  • 6: Multimedia Analysis of Video Sources Juan Arraiza Irujo, Montse Cuadros, Naiara Aginako, Matteo Raffaelli, Olga Kaehm, Naser Damer and Joao P. Neto
13:15 Lunch (13:15 - 14:30)
14:30 - 16:30 - Room Hörsaal FH 2 Parallel Session 2 - DCNET
  • 3: Routing Strategy of a Prioritized Limited Multi-Server Processor-Sharing System Yoshiaki Shikata and Nobutane Hanayama
  • 8: AVP - An Android Virtual Playground François Gagnon, Frédéric Lafrance, Simon Frenette and Simon Hallé
  • 9: Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering Petr Matoušek, Ondřej Ryšavý, Matěj Grégr and Martin Vymlátil
  • 13: Papers, Please... - X.509 Certificate Revocation in Practice Manuel Koschuch and Ronald Wagner
  • 18: A SCTP-based Authentication Protocol: SCTPAP Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat and K. F. Hsiao
14:30 - 16:30 - Room Hörsaal FH 3 Parallel Session 2 - ICE-B
  • 21: Pricing and Competition in Mobile App Markets Ning-Yao Pai and Yung-Ming Li
  • 22: QoS based Resource Allocation and Service Selection in the Cloud Rima Grati, Khouloud Boukadi and Hanêne Ben-Abdallah
14:30 - 16:30 - Room Hörsaal FH 4 Parallel Session 2 - SECRYPT
  • 21: Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions Paulo Shakarian, Damon Paulo, Massimiliano Albanese and Sushil Jajodia
  • 24: Certificateless Non-Interactive Key Exchange Protocol without Pairings Yun Wei, Fushan Wei and Chuangui Ma
  • 71: Formal Analysis of Electronic Exams Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini and Peter Y. A. Ryan
  • 72: Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino and Neeraj Suri
14:30 - 16:30 - Room Seminarraum 101 A Parallel Session 2 - SIGMAP
  • 39: Self-calibration of Large Scale Camera Networks Patrik Goorts, Steven Maesen, Yunjun Liu, Maarten Dumont, Philippe Bekaert and Gauthier Lafruit
  • 47: Noise Mitigation over Powerline Communication Using LDPC-Convolutional Code and Fusion of Mean and Median Filters Yassine Himeur and Abdelkrim Boukabou
  • 53: Evaluation of Acoustic Feedback Cancellation Methods with Multiple Feedback Paths Bruno Bispo and Diamantino Freitas
14:30 - 16:30 - Room Hörsaal FH 7 Parallel Session 2a - SECRYPT
  • 29: Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction Vandana Guleria and Ratna Dutta
  • 35: A Secure Anonymous Proxy Multi-signature Scheme Vishal Saraswat and Rajeev Anand Sahu
  • 76: Privacy Preserving Delegated Word Search in the Cloud Kaoutar Elkhiyaoui, Melek Önen and Refik Molva
  • 66: KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited Jinyong Chang and Rui Xue
14:30 - 16:30 - Room Seminarraum 325/2 Parallel Session 2 - MUSESUAN
  • 5: A Multi-configuration Part-based Person Detector Alvaro Garcia-Martin, Ruben Heras Evangelio and Thomas Sikora
  • 7: GIS-supported People Tracking Re-acquisition in a Multi-camera Environment Anastasios Dimou, Vasileios Lovatsis, Andreas Papadakis, Stelios Pantelopoulos and Petros Daras
  • 4: Data Integration, Semantic Data Representation and Decision Support for Situational Awareness in Protection of Critical Assets Atta Badii, Marco Tiemann and Daniel Thiemert
16:30 - 17:30 - Studierraum Posters Session 2
  • 4: The Method of Automated Monitoring of Product Prices and Market Position Determination in Relation to Competition Quotes - Monitoring of Product Prices and Marketability Development with Continuous Assessment of Market Position in on-Line Sales Radoslav Fasuga, Pavel Stoklasa and Martin Němec
  • 6: A Comparative Study of Engineering and Business Students’ Attitude to e-Business Application Andreas Ahrens and Jeļena Zaščerinska
  • 7: A Framework for Selecting Sample Size in Educational Research on e-business Application Andreas Ahrens and Jelena Zaščerinska
  • 25: Proposed Business Model for SME Farmers in Peri-Urban Sydney Region Ana Hol, Omar Mubin and Athula Ginige
  • 32: Electronic Internal Marketing for Tourism - A New Tourism Marketing Approach Shohei Suzuki and Shoichi Morimoto
  • 33: e-Shop User Preferences via User Behavior Peter Vojtáš and Ladislav Peška
  • 41: Usage of Semantic Transformations in B2B Integration Solutions Leonid Shumsky, Pavel Shapkin and Viacheslav Wolfengagen
  • 42: Automatic Business Process Model Assembly on the Basis of Subject-Oriented Semantic Process Mark-up Alexander Gromoff, Nikolay Kazantsev, Pavel Shapkin and Leonid Shumsky
  • 45: A Research on Inflation Expectations Measurements and Applications - A View Based on Network Behavior Yi Sun, Benfu Lv and Tian Xue
  • 46: Literature Review and an Analysis of the State of the Market of Anything Relationship Management (xRM) - xRM as an Extension of Customer Relationship Management Jonathan P. Knoblauch and Rebecca Bulander
  • 7: A Formal Model for Forensic Storage Media Preparation Tools Benjamin Aziz, Philippe Massonet and Christophe Ponsard
  • 22: A Steganographic Protocol Based on Linear Error-Block Codes Rabiî Dariti and El Mamoun Souidi
  • 45: Hybrid-Style Personal Key Management in Ubiquitous Computing Byoungcheon Lee
  • 57: Partial Fingerprint Identification Through Correlation-Based Approach Omid Zanganeh, Nandita Bhattacharjee and Bala Srinivasan
  • 125: Secure Key Distribution based on Meteor Burst Communications Amir Sulimov and Arkadij Karpov
  • 129: Using Abductive and Inductive Inference to Generate Policy Explanations Fabio Marfia
  • 130: Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud Maherzia Belaazi, Hanen Boussi Rahmouni and Adel Bouhoula
  • 131: Pseudorandom Number Generators with Balanced Gray Codes J.-F. Couchot, P.-C. Heam, C. Guyeux, Q. Wang and J. M. Bahi
  • 133: Keeping an Eye on Your Security Through Assurance Indicators Moussa Ouedraogo, Chien-Ting Kuo , Simon Tjoa, David Preston, Eric Dubois, Paulo Simoes and Tiago Cruz
  • 141: RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies Mikko Kiviharju
  • 8: Computational Complexity Analysis of the Graph Extraction Algorithm for Volumetric Segmentation Method Dumitru Dan Burdescu, Liana Stanescu, Marius Brezovan and Cosmin Stoica Spahiu
  • 12: Real-time Super Resolution Equipment for 8K Video Seiichi Gohshi
  • 27: Home Position Recognition Methods Using Polarizing Films for an Eye-gaze Interface System Kohichi Ogata, Kensuke Sakamoto and Shingo Niino
  • 35: Protecting Digital Fingerprint in Automated Fingerprint Identification System using Local Binary Pattern Operator Ait Sadi Karima, Bouchair Imène , K. Zebbiche and Moussadek Laadjel
  • 41: Image Enhancement for Hand Sign Detection Jing-Wein Wang, Tzu-Hsiung Chen and Tsong-Yi Chen
  • 69: Towards a Wake-up and Synchronization Mechanism for Multiscreen Applications using iBeacon Louay Bassbouss, Görkem Güçlü and Stephan Steglich
  • 12: Remote Laboratory for Computer Networks Ladislav Balik, Josef Horalek, Vladimir Sobeslav and Ondrej Hornig
  • 15: The Bio-Inspired and Social Evolution of Node and Data in a Multilayer Network Marialisa Scatà, Alessandro Di Stefano, Evelina Giacchi, Aurelio La Corte and Pietro Liò
16:30 Coffee-Break (16:30 - 17:15)
17:30 - 18:30 - Room Hörsaal FH 5 Keynote Lecture A Need-based Assessment for Building a National Cyber Security Workforce Seymour Goodman, Georgia Institute of Technology, United States
18:30 Welcome Drink (18:30 - 19:00)