Author Index
A B C D E F G H I J K L M N O P R S T U V W X Y Z
| Author | Session | Start page | Title |
|---|---|---|---|
| A A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Abbadi, Imad | MC-O4.2 | Dynamics of Trust in Clouds — Challenges and Research Agenda | |
| MD-O4.3 | Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | ||
| Abdel Fattah, Amr | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
| MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
| Abdel-Hafez, Ahmed | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
| MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
| Abdelhalim, Mohamed | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
| Abdlrudha, Hadi | MC-O3.4 | Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map | |
| Abdouli, Ameera | SD-O1.3 | Survey on Computationally Hard Problems and Their Applications to Cryptography | |
| Abulaish, Muhammad | WA-O3.3 | Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process | |
| Adegbenro, Olouwole | WA-O3.6 | Concurrent Realization of the Multiply-By-7 Elliptic Curve Scalar Multiplication Algorithm | |
| Ahmad, Kassem | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
| Ahmed, Haseeb | MD-O1.3 | Designing a Hierarchical DHCP Server's Model to Automatically Provide Dedicated IP Address Anywhere in the World with Mobility | |
| Aichroth, Patrick | TC-O3.1 | Access Control and Content Authentication for Hybrid DVB-T2/P2P Broadcasting | |
| Akmayeva, Galyna | MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | |
| Akram, Muhammad Usman | MC-O2.3 | Retinal Recognition: Personal Identification Using Blood Vessels | |
| MC-O2.1 | An Automated System for Fingerprint Classification Using Singular Points for Biometric Security | ||
| Al Ameiri, Faisal | MD-O4.4 | Evaluation of Popular Application Sandboxing | |
| MD-O4.5 | Mobile Arabic Sign Language | ||
| Al Awadhi, Ibtesam | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
| WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | ||
| Al Ebri, Noura | SD-O1.2 | Study on Secret Sharing Schemes (SSS) and Their Applications | |
| Al Housani, Hajer | SD-O1.4 | Survey on Certificateless Public Key Cryptography | |
| Al Mutawa, Noora | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
| WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | ||
| Al Obaidli, Hanan | WA-O3.1 | Digital Forensics Education in UAE | |
| Al Shehhi, Muna | SC-O1.6 | The Use of Boolean Functions in Stream Ciphers | |
| Al Tair, Hend | TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | |
| Al-Duwairi, Basheer | MD-O2.4 | Texture Analysis-Based Image Spam Filtering | |
| Al-Hamadi, Hussam | TD-O2.1 | Formal Modeling and Verification of DLK Protocol | |
| Al-Jaroodi, Jameela | TC-O1.2 | The Challenges of Arabic Language Use on the Internet | |
| Al-Jarrah, Omar | MD-O2.4 | Texture Analysis-Based Image Spam Filtering | |
| Al-Jumeily, Dhiya | MC-O4.5 | Research, Design and Development Review of the Cloud Computing Management System (Ccms) | |
| Al-Qutayri, Mahmoud | SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | |
| TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | ||
| TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
| Al-Somani, Turki | SC-O1.1 | Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks | |
| SC-O1.2 | Implementation of GF(2m) Elliptic Curve Cryptoprocessor on a Nano FPGA | ||
| Alahmad, Mahmoud | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
| Albalooshi, Noora | TC-O1.2 | The Challenges of Arabic Language Use on the Internet | |
| AlDahak, Amna | TD-O1.3 | Evaluating USARsim for Use in Fire Search and Rescue | |
| Alghathbar, Khaled | WA-O3.3 | Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process | |
| Ali, Amjad | MD-O3.2 | Securing Information Systems in Airports - a Practical Approach | |
| Aljuhaishi, Nasser | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
| AlMarashda, Khalfan | SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | |
| AlSalami, Yousuf | SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | |
| Amin, Asjad | MD-O1.3 | Designing a Hierarchical DHCP Server's Model to Automatically Provide Dedicated IP Address Anywhere in the World with Mobility | |
| TD-O4.4 | Modified Run Length Encoding Scheme with Introduction of Bit Stuffing for Efficient Data Compression | ||
| Analoui, Morteza | TD-O1.5 | An Economical Mechanism for Multicasting of Content Among Servers of Hybrid CDN-P2P Networks | |
| Anghelescu, Petre | MC-O3.2 | FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications | |
| Anton, Constantin | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
| Arakawa, Jumpei | MC-O1.3 | A Decentralized Access Control Mechanism Using Authorization Certificate for Distributed File Systems | |
| Asllani, Arben | MD-O3.2 | Securing Information Systems in Airports - a Practical Approach | |
| Ayyad, Mohammad | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
| Azer, Marianne | MD-O3.5 | Immunizing the SAODV Protocol Against Routing Information Disclosure | |
| Azmi, Reza | WA-O2.1 | SeKMAC: A Secure Model for Key Management and Access Control in Cryptographic File System | |
| B A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Baajour, Lama | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
| Badra, Mohamad | SC-O1.1 | Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks | |
| Baek, Joonsang | SC-O1.6 | The Use of Boolean Functions in Stream Ciphers | |
| SD-O1.4 | Survey on Certificateless Public Key Cryptography | ||
| SD-O1.2 | Study on Secret Sharing Schemes (SSS) and Their Applications | ||
| SD-O1.3 | Survey on Computationally Hard Problems and Their Applications to Cryptography | ||
| Baggili, Ibrahim | WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | |
| Bagheri, Nasour | TC-O4.5 | Vulnerabilities in a New RFID Access Control Protocol | |
| TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | ||
| Bakhache, Bassem | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
| Bassil, Ramzi | TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | |
| Bavafa, Majid | MC-O1.4 | A Survey on Space-Time & High-Rate Redundant | |
| Bazargan, Fatma | MB-O1.1 | Understanding the Security Challenges of Virtualized Environments | |
| Belaqziz, Salwa | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
| Ben Ayed, Ghazi | TD-O2.5 | Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a Digital Society of Privacy | |
| Benferhat-OldAccount, Salem | TD-O2.6 | Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model | |
| Benlamri, Rachid | TC-O5.4 | Context-Aware Real-Time Framework for Local Collaboration | |
| Bès, Christian | MC-O3.1 | Study of the Robustness of an Enhanced CSK System by Using the Extended Kalman Filter | |
| Bilski, Tomasz | TD-O3.4 | Security-Functionality Tradeoffs in IP Transition Phase | |
| Bosch, Thomas | TD-O4.3 | XSLT Transformation Generating OWL Ontologies Automatically Based on XML Schemas | |
| Boudguiga, Aymen | MC-O3.6 | An EAP ID-Based Authentication Method for Wireless Networks | |
| Bouriche, Khalid | TD-O2.6 | Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model | |
| Boustia, Narhimene | WA-O2.5 | Temporal Context in Multilevel Access Control Model | |
| Branco, António Horta | TC-O1.4 | The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering | |
| Büttner, Daniela | WA-O1.2 | Desktop Search Engines - a State of the Art Comparison | |
| C A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Caragata, Daniel | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
| MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | ||
| MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | ||
| Cenys, Antanas | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
| Chang, Yoon Seok | TC-O4.2 | A Study on RFID Code Structure for Traceability System of Electric Vehicle Batteries | |
| Chargé, Pascal | MB-O2.1 | Chaos Generation From 1D or 2D Circuits Including Switches | |
| Chehab, Ali | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
| TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | ||
| TC-O4.6 | A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks | ||
| Chernikova, Oksana | MC-O2.2 | Handwriting Dynamics as a Means of Authentication | |
| Cherrier, Estelle | MB-O2.2 | Noise-resisting Ciphering Based on a Chaotic Multi-Stream Pseudo-Random Number Generator | |
| Chetto, Maryline | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
| TC-O1.5 | Real-Time Scheduling for Energy Harvesting Sensors | ||
| Chibani, Youcef | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
| Chittayasothorn, Suphamit | MD-O1.5 | A Thin Client Application Development Using OCL and Conceptual Schema | |
| Choudhary, Abdur Rahim | TD-O1.6 | Policy Rule-Sets for Policy Based Systems | |
| Chung, Tai-Myoung | TC-O5.6 | Performace Evaluation of Relative Positioning Based on Low-cost GPS and VANET | |
| Cot, Léa Dominique | MC-O3.1 | Study of the Robustness of an Enhanced CSK System by Using the Extended Kalman Filter | |
| D A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Daikpor, Michael | WA-O3.6 | Concurrent Realization of the Multiply-By-7 Elliptic Curve Scalar Multiplication Algorithm | |
| Dehghan, Mehdi | WA-O3.5 | Performance Assessment of OLSR Protocol Under Routing Attacks | |
| Del Soldato, Arianna | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
| DeMott, Jared | MD-O3.4 | Towards an Automatic Exploit Pipeline | |
| Derraschouk, Meriem | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
| Diab, Mohamed | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
| Dony, Robert | TD-O2.4 | Segmentation Based Encryption Method for Medical Images | |
| E A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Ekberg, Jarkko | TD-O3.3 | Network Behaviour Anomaly Detection Using Holt-Winters Algorithm | |
| El Assad, Safwan | MB-O2.3 | Multicast Security Protocol Over Satellite DVB Based on Chaotic Sequences | |
| MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | ||
| MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | ||
| El fazziki, Abdelaziz | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
| EL Ghor, Hussein | TC-O1.5 | Real-Time Scheduling for Energy Harvesting Sensors | |
| El Shahat, Omar | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
| El-Beaino, Wissam | TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | |
| El-Khatib, Khalil | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
| El-Mahallawy, Mohamed | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
| El-Sharkasy, Wael | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
| Eladnani, Mohamed | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
| Elhajj, Imad | MD-O1.1 | Hop Count Variability | |
| Elhennawy, Adel | TC-O4.7 | Implementation of a Modified Lightweight Cryptographic TEA Algorithm in RFID System | |
| Elmoghany, Mohamed | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
| Elramly, Salwa | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
| MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
| F A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Fankhauser, Florian | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
| Farooqi, Norah | WA-O2.6 | Trust-Based Access Control for XML Databases | |
| Fischer, Daniel | WA-O1.2 | Desktop Search Engines - a State of the Art Comparison | |
| Fournier-Prunaret, Danièle | MB-O2.1 | Chaos Generation From 1D or 2D Circuits Including Switches | |
| Francis, Tina | MD-O4.1 | Proximity Aware Overlays in Peer-to-Peer Networks | |
| Fujii, Arisa | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
| G A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Gahi, Youssef | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
| Garcia, Ana Cristina | TC-O1.4 | The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering | |
| Gardini, Laura | MB-O2.1 | Chaos Generation From 1D or 2D Circuits Including Switches | |
| Garmehi, Mehran | TD-O1.5 | An Economical Mechanism for Multicasting of Content Among Servers of Hybrid CDN-P2P Networks | |
| Gawanmeh, Amjad | TD-O3.6 | Modeling and Verification of Firewall Configurations Using Domain Restriction Method | |
| TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
| Ghaemi Bafghi, Abbas | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
| Ghaemi Bafghi, Abbas | TC-O2.5 | Propagation of Trust and Confidence Using Intervals | |
| Ghali, Cesar | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
| Ghernaouti, Solange | TD-O2.5 | Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a Digital Society of Privacy | |
| Granzer, Wolfgang | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
| Grechenig, Thomas | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
| Gruber, Markus | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
| Guelpeli, Marcus Vinicius | TC-O1.4 | The Process of Summarization in the Pre-Processing Stage in Order to Improve Measurement of Texts When Clustering | |
| Guennoun, Mouhcine | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
| Guennoun, Zouhair | TC-O5.1 | Encrypted Processes for Oblivious Data Retrieval | |
| Guimaraes, Mario | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
| H A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Habibi Lashkari, Arash | TC-O2.4 | Users' Perceptions on Mobile Devices Security Awareness in Malaysia | |
| Haider, Sajjad | MC-O3.3 | Security Threats in Cloud Computing | |
| Halboob, Waleed | WA-O3.3 | Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process | |
| Hanafy, Ayman | MD-O3.5 | Immunizing the SAODV Protocol Against Routing Information Disclosure | |
| Harati, Ahad | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
| Haron, Galoh | WA-O2.4 | Extrapolating Security Requirements to an Established Software Process: Version 1.0 | |
| Hasna, Hosen | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
| Hasselbach, Jens | TC-O3.1 | Access Control and Content Authentication for Hybrid DVB-T2/P2P Broadcasting | |
| Heenaye-Mamode Khan, Maleika | MC-O2.5 | Dorsal Hand Vein Biometric Using Independent Component Analysis (ICA) | |
| Hempel, Michael | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
| Hettak, Khelifa | TD-O5.3 | Redundant Reader Elimination for Directional Antenna in RFID Systems | |
| Hildmann, Hanno | MD-O2.5 | Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management | |
| TC-O5.2 | Demand-Side Management for Air Conditioning | ||
| TD-O1.2 | Behavioural Game AI - a Theoretical Approach | ||
| Hirsch, Benjamin | WA-O1.4 | Education Beyond the Cloud: Anytime-anywhere Learning in a Smart Campus Environment | |
| Houssain, Hilal | SC-O1.1 | Hardware Implementations of Elliptic Curve Cryptography in Wireless Sensor Networks | |
| SC-O1.2 | Implementation of GF(2m) Elliptic Curve Cryptoprocessor on a Nano FPGA | ||
| Hu, Xin | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
| MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
| Huet, Fabrice | TC-O5.5 | Virtual Cloud: Rent Out the Rented Resources | |
| Hughes, Glyn | MC-O4.5 | Research, Design and Development Review of the Cloud Computing Management System (Ccms) | |
| Hussain, Abir | MC-O4.5 | Research, Design and Development Review of the Cloud Computing Management System (Ccms) | |
| I A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Iana, Vasile-Gabriel | MC-O3.2 | FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications | |
| Ibrahim, Magdy | MB-O1.2 | Synchronization Recovery of Chaotic Signal Through Imperfect Channel Using Optimization Approach | |
| MB-O1.3 | Denoising Algorithm for Noisy Chaotic Signal by Using Wavelet Transform: Comprehensive Study | ||
| Imai, Hideki | MC-O4.1 | A Secure Public Cloud Storage System | |
| Ionescu, Laurentiu | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
| Ionita, Silviu | MC-O3.2 | FPGA Implementation of Cellular Automata Based Encryption Algorithm for Internet Communications | |
| Iqbal, Asif | WA-O3.1 | Digital Forensics Education in UAE | |
| Iraqi, Youssef | TC-O2.2 | Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework | |
| TC-O2.3 | Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages | ||
| Irfan, Nazish | TD-O5.3 | Redundant Reader Elimination for Directional Antenna in RFID Systems | |
| Ishaque, Nadia | TC-O1.1 | Using Keystroke-Level Model to Analyze IOS Optimization Techniques | |
| Ishikawa, Kiyohiko | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
| Itani, Wassim | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
| J A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Jeyalatha, Sivaramakrishnan | TD-O4.1 | Design and Implementation of a Web Structure Mining Algorithm Using Breadth First Search Strategy for Academic Search Application | |
| Jones, Andrew | TC-O2.2 | Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework | |
| TC-O2.3 | Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages | ||
| Jung, Markus | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
| K A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Kassem, Moustafa | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
| Kastner, Wolfgang | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
| Kayssi, Ayman | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
| TC-O4.3 | A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol | ||
| TC-O4.6 | A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks | ||
| Khairallah, Mustafa | SC-O1.5 | FPGA Implementation of High Speed XTS-AES for Data Storage Devices | |
| Khan, Shoab | MC-O2.3 | Retinal Recognition: Personal Identification Using Blood Vessels | |
| Khater, Ismail | MD-O2.4 | Texture Analysis-Based Image Spam Filtering | |
| Khonji, Mahmoud | TC-O2.2 | Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework | |
| TC-O2.3 | Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages | ||
| Kienesberger, Georg | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
| Kim, Jung Tae | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
| TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
| Klingbeil, Thomas | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
| Kobara, Kazukuni | MC-O4.1 | A Secure Public Cloud Storage System | |
| Kopsidas, Spyros | MD-O1.2 | Mailbook a Social Network Against Spamming | |
| Kuba, Martin | MC-O1.6 | Automated Trust Negotiation in Identity Federations Using OWL-based Abduction of Missing Credentials | |
| Kurki, Taina | WA-O2.2 | Systematic Literature Review of Virtual Role | |
| L A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Laila, Umm-e- | TC-O1.1 | Using Keystroke-Level Model to Analyze IOS Optimization Techniques | |
| Lakshmi Eswari, Ponnapu | TC-O1.6 | A Process Framework for Securing an e-Learning Ecosystem | |
| Laurent, Maryline | MC-O3.6 | An EAP ID-Based Authentication Method for Wireless Networks | |
| Lazzareschi, Pasquale | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
| Le Page, Michel | TD-O4.5 | An Agent-Based Modeling Approach for Decision-Making in Gravity Irrigation Systems | |
| Lee, HoonKi | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
| TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
| Lee, Jonghoon | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
| TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
| Leida, Marcello | TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | |
| Leucker, Martin | WA-O2.3 | An Event Pattern Language for Runtime Monitoring Based on AOP | |
| Liao, Junguo | SD-O1.5 | Anonymous Electronic Voting Protocol with Traceability | |
| Lim, Hun-Jung | TC-O5.6 | Performace Evaluation of Relative Positioning Based on Low-cost GPS and VANET | |
| Ling, Lezhen | SD-O1.5 | Anonymous Electronic Voting Protocol with Traceability | |
| Liu, Jie | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
| MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
| Lo, Nai-Wei | TC-O4.1 | Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators | |
| Loula, Pekka | TD-O3.3 | Network Behaviour Anomaly Detection Using Holt-Winters Algorithm | |
| Lozhnikov, Pavel | MC-O2.2 | Handwriting Dynamics as a Means of Authentication | |
| Lozi, René | MB-O2.2 | Noise-resisting Ciphering Based on a Chaotic Multi-Stream Pseudo-Random Number Generator | |
| M A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Ma, Tao | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
| Mahmood, Ahmed | TD-O2.4 | Segmentation Based Encryption Method for Medical Images | |
| Malik, Sheheryar | TC-O5.5 | Virtual Cloud: Rent Out the Rented Resources | |
| Mamode Khan, Naushad | MC-O2.5 | Dorsal Hand Vein Biometric Using Independent Component Analysis (ICA) | |
| Mar, Kheng Kok | MC-O4.3 | Secured Virtual Diffused File System for the Cloud | |
| Markscheffel, Bernd | WA-O1.2 | Desktop Search Engines - a State of the Art Comparison | |
| Marrington, Andrew | WA-O3.2 | Forensic Artifacts of Facebook's Instant Messaging Service | |
| Martin, Andrew | MD-O4.3 | Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | |
| Martin, Thomas | SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | |
| Martinelli, Maurizio | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
| Marzouqi, Hamad | SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | |
| Marzouqi, Mohamed | MD-O4.5 | Mobile Arabic Sign Language | |
| TD-O1.3 | Evaluating USARsim for Use in Fire Search and Rescue | ||
| Maseri, Naimeh | MC-O1.4 | A Survey on Space-Time & High-Rate Redundant | |
| Mathew, Suresh | MC-O4.6 | Security Concerns for Cloud Computing in Aircraft Data Networks | |
| Mathiak, Brigitte | TD-O4.3 | XSLT Transformation Generating OWL Ontologies Automatically Based on XML Schemas | |
| Mazare, Alin | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
| Mehrnejad, Maryam | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
| MD-O3.6 | A Novel Method in Fuzzy Data Clustering Based on Chaotic PSO | ||
| Meinel, Christoph | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
| Mendonça, Flávio | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
| Meybodi, Mohammad Reza | TD-O1.4 | An Application of Imperialist Competitive Algorithm to Solve the Quadratic Assignment Problem | |
| Mi, Bo | MC-O1.1 | A Novel Key Establishment Scheme for Wireless Sensor Networks Based on Complex Network Synchronization | |
| Mladenov, Valeri | MD-O3.3 | Synchronization of Sigma Delta Modulators | |
| Mohamed, Nader | TC-O1.2 | The Challenges of Arabic Language Use on the Internet | |
| Mokhtari, Aicha | WA-O2.5 | Temporal Context in Multilevel Access Control Model | |
| Mourad, Azzam | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
| Mukaddam, Ayman | MD-O1.1 | Hop Count Variability | |
| N A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Naderi, Majid | TC-O4.5 | Vulnerabilities in a New RFID Access Control Protocol | |
| TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | ||
| Namiluko, Cornelius | MC-O4.2 | Dynamics of Trust in Clouds — Challenges and Research Agenda | |
| MD-O4.3 | Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | ||
| Narayanaswami, Sundaravalli | MD-O3.1 | Mobile Adhoc Networks: A Simulation Based Security Evaluation and Intrusion Prevention | |
| Nasir, Qassim | MC-O3.4 | Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map | |
| Nassr, Nezar | MC-O4.4 | A Parameterized RBAC Access Control Model for WS-BPEL Orchestrated Composite Web Services | |
| Nazemi, Eslam | TC-O3.5 | A Policy Based Access Control Model for Web Services | |
| Ng, Jason | WA-O1.4 | Education Beyond the Cloud: Anytime-anywhere Learning in a Smart Campus Environment | |
| Nicolas, Sebastien | MD-O2.5 | Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management | |
| TC-O5.2 | Demand-Side Management for Air Conditioning | ||
| Nogueira, António | TD-O3.2 | A Real-Time Traffic Classification Approach | |
| Nogueira, José Luiz | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
| Noponen, Sami | WA-O2.2 | Systematic Literature Review of Virtual Role | |
| North, Siobhán | WA-O2.6 | Trust-Based Access Control for XML Databases | |
| Noura, Hassan | MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | |
| Noureldin, Sherif | MD-O3.5 | Immunizing the SAODV Protocol Against Routing Information Disclosure | |
| O A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Oreku, George | MD-O4.6 | Key Complication Procedure In Data Driven Ciphers Based on Controlled Substitution-Permutation Networks | |
| Otrok, Hadi | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
| Otsuki, Kazuhiro | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
| Ouali, Anis | TD-O1.1 | A MILP Based Design Tool for FTTH Access Networks with Consideration of Demand Growth | |
| Ouari, Asma | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
| Ouda, Abdelkader | TD-O3.1 | Solutions to Security Issues with Legacy Integration of GSM Into UMTS | |
| Ouzarf, Mohamed | TD-O2.6 | Encoding Default-Based SELinux-security Policy in Organization-Based Access Control Model | |
| P A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Paik, Eui-Hyun | TC-O1.3 | Design and Implementation of the Geo-Context Engine for Semantic Social Media Service | |
| TD-O4.2 | Location-based Personalized Social Media Service for the Smart Phone | ||
| Peng, Dongming | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
| Poon, Kin | TD-O1.1 | A MILP Based Design Tool for FTTH Access Networks with Consideration of Demand Growth | |
| R A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Radvilavicius, Lukas | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
| Rahimiasl, Farshad | WA-O2.1 | SeKMAC: A Secure Model for Key Management and Access Control in Cryptographic File System | |
| Ren, Zhanrui | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
| MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
| Rocha, Eduardo | TD-O3.2 | A Real-Time Traffic Classification Approach | |
| Ruan, Shiou-Huei | TC-O4.1 | Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators | |
| S A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Saab, Salwa Adriana | TC-O4.6 | A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks | |
| Saab, Soulaf | MD-O2.6 | Secure Delay-Tolerant Communications in the Presence of Oppressive Governments | |
| Sabbari, Mehdi | TC-O3.5 | A Policy Based Access Control Model for Web Services | |
| Sabeeh, Ahmed | TC-O2.4 | Users' Perceptions on Mobile Devices Security Awareness in Malaysia | |
| Sadok, Hicham | WA-O1.6 | E-banking in Morocco: Study of Some Specifying Factors | |
| Saeed, Muhammad Qasim | MD-O2.3 | A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition | |
| Saetent, Jane | MD-O1.5 | A Thin Client Application Development Using OCL and Conceptual Schema | |
| Safari, Ali | TD-O1.4 | An Application of Imperialist Competitive Algorithm to Solve the Quadratic Assignment Problem | |
| Saffre, Fabrice | MD-O2.5 | Critical Infrastructure Protection Through Distributed Reactive Demand-Side Management | |
| TC-O5.2 | Demand-Side Management for Air Conditioning | ||
| Safkhani, Masoume | TC-O4.5 | Vulnerabilities in a New RFID Access Control Protocol | |
| TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | ||
| Said, Huwida | SC-O1.4 | Forensics and War-Driving on Unsecured Wireless Network | |
| Salah, Khaled | SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | |
| SD-O1.1 | On the Security of Inclusion or Omission of MixColumns in AES Cipher | ||
| MD-O4.4 | Evaluation of Popular Application Sandboxing | ||
| MD-O4.2 | Performance Evaluation of Popular Cloud IaaS Providers | ||
| Salehi, Mahmood | WA-O3.5 | Performance Assessment of OLSR Protocol Under Routing Attacks | |
| Salem Al Mazrouei, Maitha | MD-O3.1 | Mobile Adhoc Networks: A Simulation Based Security Evaluation and Intrusion Prevention | |
| Salonen, Jarno | WA-O2.2 | Systematic Literature Review of Virtual Role | |
| Salvador, Paulo | TD-O3.2 | A Real-Time Traffic Classification Approach | |
| Samavati, Hamed | WA-O3.5 | Performance Assessment of OLSR Protocol Under Routing Attacks | |
| Sandhya, Somitra | TD-O5.2 | Security Analysis of LMAP++, an RFID Authentication Protocol | |
| Sasada, Koichi | MC-O1.3 | A Decentralized Access Control Mechanism Using Authorization Certificate for Distributed File Systems | |
| Schanes, Christian | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
| Scott, Kris | TC-O5.4 | Context-Aware Real-Time Framework for Local Collaboration | |
| Seneviratne, Lakmal | TD-O1.3 | Evaluating USARsim for Use in Fire Search and Rescue | |
| Serban, Gheorghe | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
| Seyyed Alipour, Hadiseh | TC-O3.5 | A Policy Based Access Control Model for Web Services | |
| Shaikh, Farhan | MC-O3.3 | Security Threats in Cloud Computing | |
| Shakeri, Hassan | TC-O2.5 | Propagation of Trust and Confidence Using Intervals | |
| Shami, Abdallah | TD-O3.1 | Solutions to Security Issues with Legacy Integration of GSM Into UMTS | |
| Shamseldin, Ramez | MD-O1.6 | Dynamically Complex System Using Adaptive Simulation for Interconnected Nodes | |
| Sharif, Hamid | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
| WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | ||
| Shin, SeongHan | MC-O4.1 | A Secure Public Cloud Storage System | |
| Shoniregun, Charles | MD-O2.2 | UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols | |
| Shrestha, Pradhumna | TC-O3.2 | A General Attack Method for Steganography Removal Using Pseudo-CFA Re-interpolation | |
| Sihvonen, Hanna-Miina | WA-O2.2 | Systematic Literature Review of Virtual Role | |
| Siong, Ng | WA-O2.4 | Extrapolating Security Requirements to an Established Software Process: Version 1.0 | |
| Sohizadeh Abyaneh, Mohammad Reza | TD-O5.1 | On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs | |
| Southern, Eric | TD-O3.1 | Solutions to Security Issues with Legacy Integration of GSM Into UMTS | |
| Steegmans, Eric | MC-O4.4 | A Parameterized RBAC Access Control Model for WS-BPEL Orchestrated Composite Web Services | |
| Sun, Yonglin | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
| MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
| Suresh, Nitha | MC-O4.6 | Security Concerns for Cloud Computing in Aircraft Data Networks | |
| T A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Taber, Stefan | TC-O2.6 | Trapping and Analyzing Malicious VoIP Traffic Using a Honeynet Approach | |
| Tahar, Sofiene | TD-O3.6 | Modeling and Verification of Firewall Configurations Using Domain Restriction Method | |
| Taheri, Mohammad Moein | TC-O5.3 | 2-Phase Optimization Method for Energy Efficient Scheduling of Virtual Machines in Cloud DataCenters | |
| Taheri Hanjani, Zahra | MC-O1.4 | A Survey on Space-Time & High-Rate Redundant | |
| Taralova, Ina | MD-O3.3 | Synchronization of Sigma Delta Modulators | |
| Tariq, Anam | MC-O2.3 | Retinal Recognition: Personal Identification Using Blood Vessels | |
| MC-O2.1 | An Automated System for Fingerprint Classification Using Singular Points for Biometric Security | ||
| Tassiulas, Leandros | MD-O1.2 | Mailbook a Social Network Against Spamming | |
| Tavares, Thiago | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
| Toreini, Ehsan | MC-O2.6 | Multiple SEIMCHA; Multiple SEmantic IMage CAPTCHA | |
| MD-O3.6 | A Novel Method in Fuzzy Data Clustering Based on Chaotic PSO | ||
| Trevisan, Daniela | WA-O1.3 | A-CitizenMobile: A Case Study for Blind Users | |
| Tripathi, Devendra | TD-O3.5 | A Note on Modified SET Protocol for Mobile Payment | |
| Tsenov, Georgi | MD-O3.3 | Synchronization of Sigma Delta Modulators | |
| Tutanescu, Ion | MD-O2.1 | Reed-Muller Decoder with Associative Memories | |
| Tzouramanis, Theodoros | WA-O3.4 | A Robust Watermarking Scheme for Relational Databases | |
| U A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Unger, Martin | TD-O2.2 | Privacy Enabled Web Service Access Control Using SAML and XACML for Home Automation Gateways | |
| V A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Varalis, Argyris | MD-O1.2 | Mailbook a Social Network Against Spamming | |
| Vasarelli, Giuseppe | WA-O1.5 | The use of detection systems to improve the quality of the Italian Public Administration | |
| Vejkanchana, Nattawut | MD-O1.5 | A Thin Client Application Development Using OCL and Conceptual Schema | |
| Vijayakumar, B | TD-O4.1 | Design and Implementation of a Web Structure Mining Algorithm Using Breadth First Search Strategy for Academic Search Application | |
| Vladeanu, Calin | MC-O3.5 | An Efficient and Secure SPN Cryptosystem Based on Chaotic Control Parameters | |
| W A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Walter, Colin | MD-O2.3 | A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition | |
| Wang, Gang | TC-O3.6 | A Framework of VI-based Ranking and Recommendation of Web Services | |
| Wang, Yongjun | MC-O1.5 | A New Perspective of Network Vulnerability Analysis Using Network Security Gradient | |
| MC-O1.2 | Two Algorithms for Network Security Gradient Marking | ||
| Wei, Dong | WA-O2.3 | An Event Pattern Language for Runtime Monitoring Based on AOP | |
| Willems, Christian | TC-O2.1 | A Distributed Virtual Laboratory Architecture for Cybersecurity Training | |
| Wisnieski, Timothy | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
| Wooram, Kim | TC-O4.2 | A Study on RFID Code Structure for Traceability System of Electric Vehicle Batteries | |
| WU, Tzong-Chen | TC-O4.1 | Ownership Transfer Protocol for RFID Objects Using Lightweight Computing Operators | |
| X A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Xian, Zhang | WA-O2.3 | An Event Pattern Language for Runtime Monitoring Based on AOP | |
| Y A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Yagoub, Mustapha | TD-O5.3 | Redundant Reader Elimination for Directional Antenna in RFID Systems | |
| Yahyaoui, Hamdi | MD-O1.4 | Toward an Abstract Language on Top of XACML for Web Services Security | |
| Yamamura, Chigusa | TD-O4.6 | Identity Management Architecture for Integrated Personalized Service on TV | |
| Yeun, Chan Yeob | SC-O1.6 | The Use of Boolean Functions in Stream Ciphers | |
| SC-O1.3 | A Unified Countermeasure Against Side Channel Attacks on Cryptographic RFID | ||
| SD-O1.4 | Survey on Certificateless Public Key Cryptography | ||
| SD-O1.2 | Study on Secret Sharing Schemes (SSS) and Their Applications | ||
| SD-O1.3 | Survey on Computationally Hard Problems and Their Applications to Cryptography | ||
| MB-O1.1 | Understanding the Security Challenges of Virtualized Environments | ||
| TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
| Ylinen, Jorma | TD-O3.3 | Network Behaviour Anomaly Detection Using Holt-Winters Algorithm | |
| Yoshimura, Hiroyuki | MC-O2.4 | Fingerprint Templates with High Recognition Accuracy and High Security Generated by Discrete Fractional Sine Transform | |
| Z A B C D E F G H I J K L M N O P R S T U V W X Y Z | |||
| Zain, Syed | TC-O1.1 | Using Keystroke-Level Model to Analyze IOS Optimization Techniques | |
| Zamanifar, Kamran | TC-O5.3 | 2-Phase Optimization Method for Energy Efficient Scheduling of Virtual Machines in Cloud DataCenters | |
| Zayed, Mohamed | TC-O3.3 | An Effective Hybrid Thresholding Technique for Degraded Documents Images Binarization | |
| Zemerly, Mohamed Jamal | MB-O1.1 | Understanding the Security Challenges of Virtualized Environments | |
| MD-O4.5 | Mobile Arabic Sign Language | ||
| TC-O3.4 | Pro-Active Multi-Agent Recommender System for Travelers | ||
| TD-O2.1 | Formal Modeling and Verification of DLK Protocol | ||
| Zineddine, Mhamed | TD-O2.3 | Automated Healthcare Information Privacy and Security: UAE Case | |
| Zisiadis, Dimitris | MD-O1.2 | Mailbook a Social Network Against Spamming | |
| Zulfiqar, Muhammad | WA-O1.1 | Technologies Enabling Sustainability in the Built Environment | |
