Home
Conference Program
Paper Awards
Programme Committee
Call for Papers
Important Dates
Camera Ready Submission
Accepted Papers
Registration
Student Travel Grants
Conference Venue
Keynote speakers
Social Events
Accommodation
Travel Information
Organising Committee
Sponsors & Supporters
|
Conference Program
Communications
and Multimedia Security 2012
Monday 3rd
September 2012
9.00 - 9.30 Registration
9.30 - 10.30 Keynote Talk
Privacy Management in Global
Organisations
|
Siani Pearson, HP Labs
|
10.30 - 11.00 Tea/Coffee
Break
11.00 - 12.30 Research Papers
1 - Image and Handwriting Analysis
Robust
Resampling Detection in Digital Images
|
Hieu Cuong Nguyen, Stefan
Katzenbeisser
|
Feature
Selection on Handwriting Biometrics: Security Aspects of Artificial
Forgeries
|
Karl Kummel, Tobias Scheidat,
Claus Vielhauer
|
Security
Analysis of Image-based PUFs for Anti-Counterfeiting
|
Saloomeh Shariati, Francois
Koeune, Francois-Xavier Standaert
|
12.30 - 13.30 Lunch
13.30 - 15.00 Work in
Progress 1 - Biometrics, Forensics and Watermarking
Computer-aided contact-less
localization of latent fingerprints in low-resolution CWL scans
|
Andrey Makrushin, Tobias
Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann
|
A Method for Reducing the
Risk of Errors in Digital Forensic Investigations
|
Graeme Horsman, Christopher
Laing, Paul Vickers
|
Short Term Template Aging
Effects on Biometric Dynamic Handwriting Authentication Performance
|
Tobias Scheidat, Karl Kummel,
Claus Vielhauer
|
A New Approach to
Commutative Watermarking-Encryption
|
Roland Schmitz, Shujun Li,
Christos Grecos, Xinpeng Zhang
|
15.00 - 15.15 Extended
Abstracts 1
OOXML File Analysis of the
July 22nd Terrorist Manual
|
Hanno Langweg
|
15.15 - 15.45 Tea/Coffee
Break
15.45 - 19.00 Tour of
Canterbury
19.00 - 21.00 Welcome
Reception with Poster Display
Tuesday 4th September 2012
9.00 - 9.30 Registration
9.30 - 10.30 Keynote Talk
From Panopticon to Fresnel,
dispelling a False Sense of Security
|
Jon Crowcroft, University of
Cambridge
|
10.30 - 11.00 Tea/Coffee
Break
11.00 - 12.30 Research
Papers 2 - Authentication and Performance
Document
authentication using 2D codes: Maximizing the decoding performance using
statistical inference.
|
Mouhamadou Diong, Patrick Bas,
Wahih Sawaya, Chloe Pelle
|
Data-minimizing
Authentication goes Mobile
|
Patrick Bichsel, Jan Camenisch,
Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
|
No
Tradeoff Between Confidentiality and Performance: An Analysis on H.264/SVC
Partial Encryption
|
Zhuo Wei, Xuhua Ding, Robert
Huijie Deng, Yongdong Wu
|
12.30 - 13.30 Lunch
13.30 - 15.00 Work in
Progress 2 - Communications Security
Systematic Engineering of
Control Protocols for Covert Channels
|
Steffen Wendzel, Jorg
Keller
|
Efficiency of Secure
Network Coding Schemes
|
Elke Franz, Stefan Pfennig,
Andre Fischer
|
A new Approach for Private
Searches on Public-Key Encrypted Data
|
Amar Siad
|
Multi-Level Authentication
Based Single Sign-On for IMS Services
|
Mohamed Maachaoui, Anas Abou El
Kalam, Christian Fraboul, Abdellah Ait Ouahman
|
15.00 - 15.30 Tea/Coffee
Break
15.30 - 17.15 Extended
Abstracts 2
Cuteforce Analyzer:
Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
|
Jurgen Fuß, Wolfgang Kastl,
Robert Kolmhofer, Georg Schonberger, Florian Wex
|
A framework for enforcing
user-based authorization policies on packet filter firewalls
|
Andre Zuquete, Pedro Correia,
Miguel Rocha
|
From Biometrics to
Forensics: A Feature Collection and first Feature Fusion Approaches for
latent Fingerprint Detection using a Chromatic White Light (CWL) Sensor
|
Robert Fischer, Tobias
Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer
|
Practical Revocable
Anonymous Credentials
|
Jan Hajny, Lukas Malina
|
Are 128 bits long keys
possible in Watermarking?
|
Patrick Bas, Teddy Furon
|
Predicate-Tree based Pretty
Good Privacy of Data
|
William Perrizo, Arjun G. Roy
|
Privacy-Preserving
Scheduling Mechanism for eHealth Systems
|
Milica Milutinovic, Vincent
Naessens, Bart De Decker
|
17.15 - 17.30 Announcement of CMS2013
18.45 - 19.00 Bus/Taxi to
the Goods Shed for Conference Dinner
19.00 - 22.00 Conference
Dinner
Wednesday 5th
September 2012
8.00-10.30 Coach to
Bletchley Park
10.30-14.30 Tour of
Bletchley including lunch
14.30 Return
journey via Heathrow Airport
15-30-16.00 Drop off at
Heathrow Airport
18.30 (approx.) Arrive back in
Canterbury
|