Home
Conference Program
Paper Awards
Programme Committee
Call for Papers
Important Dates
Camera Ready Submission
Accepted Papers
Registration
Student Travel Grants
Conference Venue
Keynote speakers
Social Events
Accommodation
Travel Information
Organising Committee
Sponsors & Supporters
|
Accepted Papers
Research Papers
16
|
Security Analysis of
Image-based PUFs for Anti-Counterfeiting
|
Saloomeh Shariati, Francois
Koeune, Francois-Xavier Standaert
|
17
|
Feature Selection on
Handwriting Biometrics: Security Aspects of Artificial Forgeries
|
Karl Kummel, Tobias Scheidat,
Claus Vielhauer
|
18
|
Data-minimizing
Authentication goes Mobile
|
Patrick Bichsel, Jan Camenisch,
Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
|
19
|
No Tradeoff Between
Confidentiality and Performance: An Analysis on H.264/SVC Partial
Encryption
|
Zhuo Wei, Xuhua Ding, Robert
Huijie Deng, Yongdong Wu
|
35
|
Robust Resampling Detection
in Digital Images
|
Hieu Cuong Nguyen, Stefan
Katzenbeisser
|
42
|
Document authentication
using 2D codes: Maximizing the decoding performance using statistical
inference.
|
Mouhamadou Diong, Patrick Bas,
Wahih Sawaya, Chloe Pelle
|
Work in
Progress Papers
1
|
Systematic Engineering of
Control Protocols for Covert Channels
|
Steffen Wendzel, Jorg
Keller
|
2
|
Efficiency of Secure
Network Coding Schemes
|
Elke Franz, Stefan Pfennig,
Andre Fischer
|
14
|
Short Term Template Aging
Effects on Biometric Dynamic Handwriting Authentication Performance
|
Tobias Scheidat, Karl Kummel,
Claus Vielhauer
|
15
|
A New Approach to
Commutative Watermarking-Encryption
|
Roland Schmitz, Shujun Li,
Christos Grecos, Xinpeng Zhang
|
24
|
A new Approach for Private
Searches on Public-Key Encrypted Data
|
Amar Siad
|
27
|
Multi-Level Authentication
Based Single Sign-On for IMS Services
|
Mohamed Maachaoui, Anas Abou El
Kalam, Christian Fraboul, Abdellah Ait Ouahman
|
33
|
A Method for Reducing the
Risk of Errors in Digital Forensic Investigations
|
Graeme Horsman, Christopher
Laing, Paul Vickers
|
38
|
Computer-aided contact-less
localization of latent fingerprints in low-resolution CWL scans
|
Andrey Makrushin, Tobias
Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann
|
Posters/Extended
Abstracts
6
|
Predicate-Tree based Pretty
Good Privacy of Data
|
William Perrizo, Arjun G. Roy
|
10
|
OOXML File Analysis of the
July 22nd Terrorist Manual
|
Hanno Langweg
|
11
|
Privacy-Preserving
Scheduling Mechanism for eHealth Systemsâ€
|
Milica Milutinovic, Vincent
Naessens, Bart De Decker
|
28
|
A framework for enforcing
user-based authorization policies on packet filter firewalls
|
Andre Zuquete, Pedro Correia,
Miguel Rocha
|
32
|
Practical Revocable
Anonymous Credentials
|
Jan Hajny, Lukas Malina
|
39
|
Cuteforce Analyzer:
Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
|
Jurgen Fuß, Wolfgang Kastl,
Robert Kolmhofer, Georg Schonberger, Florian Wex
|
40
|
From Biometrics to
Forensics: A Feature Collection and first Feature Fusion Approaches for
latent Fingerprint Detection using a Chromatic White Light (CWL) Sensor
|
Robert Fischer, Tobias
Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer
|
41
|
Are 128 bits long keys
possible in Watermarking?
|
Patrick Bas, Teddy Furon
|
|