IFIP

13th Joint IFIP TC6 and TC11 Conference on
Communications and Multimedia Security - CMS 2012
September 3th - September 5th, 2012, Canterbury, UK


University of Kent
Home Conference Program Paper Awards Programme Committee Call for Papers Important Dates Camera Ready Submission Accepted Papers Registration Student Travel Grants Conference Venue Keynote speakers Social Events Accommodation Travel Information Organising Committee Sponsors & Supporters

Accepted Papers

 

Research Papers

16

Security Analysis of Image-based PUFs for Anti-Counterfeiting

Saloomeh Shariati, Francois Koeune, Francois-Xavier Standaert

17

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries

Karl Kummel, Tobias Scheidat, Claus Vielhauer

18

Data-minimizing Authentication goes Mobile

Patrick Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer

19

No Tradeoff Between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption

Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu

35

Robust Resampling Detection in Digital Images

Hieu Cuong Nguyen, Stefan Katzenbeisser

42

Document authentication using 2D codes: Maximizing the decoding performance using statistical inference.

Mouhamadou Diong, Patrick Bas, Wahih Sawaya, Chloe Pelle

 

Work in Progress Papers

1

Systematic Engineering of Control Protocols for Covert Channels

Steffen Wendzel, Jorg Keller

2

Efficiency of Secure Network Coding Schemes

Elke Franz, Stefan Pfennig, Andre Fischer

14

Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance

Tobias Scheidat, Karl Kummel, Claus Vielhauer

15

A New Approach to Commutative Watermarking-Encryption

Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang

24

A new Approach for Private Searches on Public-Key Encrypted Data

Amar Siad

27

Multi-Level Authentication Based Single Sign-On for IMS Services

Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman

33

A Method for Reducing the Risk of Errors in Digital Forensic Investigations

Graeme Horsman, Christopher Laing, Paul Vickers

38

Computer-aided contact-less localization of latent fingerprints in low-resolution CWL scans

Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann

Posters/Extended Abstracts

6

Predicate-Tree based Pretty Good Privacy of Data

William Perrizo, Arjun G. Roy

10

OOXML File Analysis of the July 22nd Terrorist Manual

Hanno Langweg

11

Privacy-Preserving Scheduling Mechanism for eHealth Systems†

Milica Milutinovic, Vincent Naessens, Bart De Decker

28

A framework for enforcing user-based authorization policies on packet filter firewalls

Andre Zuquete, Pedro Correia, Miguel Rocha

32

Practical Revocable Anonymous Credentials

Jan Hajny, Lukas Malina

39

Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors

Jurgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schonberger, Florian Wex

40

From Biometrics to Forensics: A Feature Collection and first Feature Fusion Approaches for latent Fingerprint Detection using a Chromatic White Light (CWL) Sensor

Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer

41

Are 128 bits long keys possible in Watermarking?

Patrick Bas, Teddy Furon

 

Sponsors: HP Sponsor