13th Joint IFIP TC6 and TC11 Conference on
Communications and Multimedia Security - CMS 2012
September 3th - September 5th, 2012, Canterbury, UK

University of Kent
Home Conference Program Paper Awards Programme Committee Call for Papers Important Dates Camera Ready Submission Accepted Papers Registration Student Travel Grants Conference Venue Keynote speakers Social Events Accommodation Travel Information Organising Committee Sponsors & Supporters

Conference Program

Communications and Multimedia Security 2012


Monday 3rd September 2012


9.00 - 9.30 Registration

9.30 - 10.30 Keynote Talk

Privacy Management in Global Organisations

Siani Pearson, HP Labs

10.30 - 11.00 Tea/Coffee Break

11.00 - 12.30 Research Papers 1 - Image and Handwriting Analysis

Robust Resampling Detection in Digital Images

Hieu Cuong Nguyen, Stefan Katzenbeisser

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries

Karl Kummel, Tobias Scheidat, Claus Vielhauer

Security Analysis of Image-based PUFs for Anti-Counterfeiting

Saloomeh Shariati, Francois Koeune, Francois-Xavier Standaert


12.30 - 13.30 Lunch

13.30 - 15.00 Work in Progress 1 - Biometrics, Forensics and Watermarking

Computer-aided contact-less localization of latent fingerprints in low-resolution CWL scans

Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann

A Method for Reducing the Risk of Errors in Digital Forensic Investigations

Graeme Horsman, Christopher Laing, Paul Vickers

Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance

Tobias Scheidat, Karl Kummel, Claus Vielhauer

A New Approach to Commutative Watermarking-Encryption

Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang


15.00 - 15.15 Extended Abstracts 1

OOXML File Analysis of the July 22nd Terrorist Manual

Hanno Langweg

15.15 - 15.45 Tea/Coffee Break


15.45 - 19.00 Tour of Canterbury

19.00 - 21.00 Welcome Reception with Poster Display


Tuesday 4th September 2012


9.00 - 9.30 Registration

9.30 - 10.30 Keynote Talk

From Panopticon to Fresnel, dispelling a False Sense of Security

Jon Crowcroft, University of Cambridge

10.30 - 11.00 Tea/Coffee Break

11.00 - 12.30 Research Papers 2 - Authentication and Performance

Document authentication using 2D codes: Maximizing the decoding performance using statistical inference.

Mouhamadou Diong, Patrick Bas, Wahih Sawaya, Chloe Pelle

Data-minimizing Authentication goes Mobile

Patrick Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer

No Tradeoff Between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption

Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu


12.30 - 13.30 Lunch

13.30 - 15.00 Work in Progress 2 - Communications Security

Systematic Engineering of Control Protocols for Covert Channels

Steffen Wendzel, Jorg Keller

Efficiency of Secure Network Coding Schemes

Elke Franz, Stefan Pfennig, Andre Fischer

A new Approach for Private Searches on Public-Key Encrypted Data

Amar Siad

Multi-Level Authentication Based Single Sign-On for IMS Services

Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman


15.00 - 15.30 Tea/Coffee Break

15.30 - 17.15 Extended Abstracts 2

Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors

Jurgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schonberger, Florian Wex

A framework for enforcing user-based authorization policies on packet filter firewalls

Andre Zuquete, Pedro Correia, Miguel Rocha

From Biometrics to Forensics: A Feature Collection and first Feature Fusion Approaches for latent Fingerprint Detection using a Chromatic White Light (CWL) Sensor

Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer

Practical Revocable Anonymous Credentials

Jan Hajny, Lukas Malina

Are 128 bits long keys possible in Watermarking?

Patrick Bas, Teddy Furon

Predicate-Tree based Pretty Good Privacy of Data

William Perrizo, Arjun G. Roy

Privacy-Preserving Scheduling Mechanism for eHealth Systems

Milica Milutinovic, Vincent Naessens, Bart De Decker


17.15 - 17.30 Announcement of CMS2013

18.45 - 19.00 Bus/Taxi to the Goods Shed for Conference Dinner

19.00 - 22.00 Conference Dinner


Wednesday 5th September 2012


8.00-10.30 Coach to Bletchley Park

10.30-14.30 Tour of Bletchley including lunch

14.30 Return journey via Heathrow Airport

15-30-16.00 Drop off at Heathrow Airport

18.30 (approx.) Arrive back in Canterbury

Sponsors: HP Sponsor