9:00 - 9:15 | Peeter Laud. Welcome |
| Session 1 (chair: Peeter Laud) |
9:15 - 9:45 | Hakem Beitollahi. A Ring Based Onion Circuit for Hidden Services |
9:45 - 10:15 | Jaydip Sen and Subhamoy Maitra. An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks |
10:15 - 10:45 | Radu Lupu, Eugen Borcoci and Tinku Rasheed. Identity-based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service |
10:45 - 11:00 | Kristjan Valur Jonsson and Ymir Vigfusson. Securing Distributed Aggregation with Trusted Devices |
11:00 - 11:30 | Coffee Break |
| Session 2 (chair: Raimundas Matulevičius) |
11:30 - 12:30 | Arne Ansper. Designing a Governmental Backbone (invited talk) |
12:30 - 12:45 | Audun Jøsang and Kashif Sana Dar. Server Certificates based on DNSSEC |
12:45 - 13:00 | Monika Desoi, Matthias Pocs and Benjamin Stach. The “Three-Step-Model” – Legally Compatible Design of Future Biometric Systems for Crime Prevention |
13:00 - 14:00 | Lunch |
| Session 3 (chair: Erland Jonsson) |
14:00 - 14:30 | Jordi Cucurull, Simin Nadjm-Tehrani and Massimiliano Raciti. Modular anomaly detection for smartphone ad-hoc communication |
14:30 - 15:00 | Assem Nazar, Mark M. Seeger and Harald Baier. Rooting Android — Extending the ADB by an Auto-Connecting WiFi-Accessible Root Service |
15:00 - 15:15 | Benedikt Westermann, Lars Fischer, Vinh Pham and Dogan Kesdogan. 50 Bucks Attack on Tor |
15:15 - 15:30 | Hanno Langweg. Comparison of Malware Protection of Electronic Signature Applications |
15:30 - 15:45 | Igor Kotenko, Alexey Konovalov and Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments |
15:45 - 16:15 | coffee break |
| Session 4 (chair: Dominique Unruh) |
16:15 - 16:45 | Deian Stefan, David Mazieres, John Mitchell and Alejandro Russo. Disjunction Category Labels |
16:45 - 17:15 | Frédérick Lemay, Raphael Khoury and Nadia Tawbi. Optimized Inlining of Runtime Monitors |
17:15 - 17:30 | Ashar Javed. CSP AiDer: An Automated Recommendation of Content Security Policy for Web Applications |
19:00 - late | Dinner in restaurant “Troika”, Town Hall Square
|
| Session 5 (chair: Igor Kotenko) |
9:15 - 9:45 | Veelasha Moonsamy, Ronghua Tian and Lynn Batten. Feature Reduction to speed up Malware Classification |
9:45 - 10:15 | Kirsi Helkala and Nils Kalstad Svendsen. Security and Memorability Analysis of Passwords Generated by Using Association Element and Personal Factor |
10:15 - 10:45 | Kazutomo Hamamoto, Yasuyuki Tahara and Akihiko Ohsuga. Methods for Privacy Protection Considering Status of Service Provider and User Community |
10:45 - 11:15 | coffee break |
| Session 6 (chair: Jan Willemson) |
11:15 - 12:15 | Priit Vinkel. Internet Voting in Estonia: the current system, emerged issues and future developments (invited talk) |
12:15 - 12:45 | Jérôme Dossogne and Frédéric Lafitte. Mental Voting Booths |
12:45 - 13:00 | Dalia Khader, Ben Smyth, Peter Ryan and Feng Hao. A Fair and Robust Voting System by Broadcast |
13:00 - 14:00 | Lunch |
| Session 7 (chair: Svein Johan Knapskog) |
14:00 - 14:30 | Erich Wenger and Michael Hutter. Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations |
14:30 - 15:00 | Mathias Claes, Vincent Van Der Leest and An Braeken. Comparison of SRAM and D Flip-Flop PUFs in 65nm technology |
15:00 - 15:30 | coffee break |
| Session 8 (chair: Bengt Carlsson) |
15:30 - 16:00 | Inger Anne Tøndel. Visualization Control for Event-Based Public Display Systems used in a Hospital Setting |
16:00 - 16:30 | Elahe Kani-Zabihi and Martin Helmhout. Increasing Service Users’ Privacy Awareness by Introducing On-line Interactive Privacy Features |
16:30 - 17:00 | Károly Boda, Ádám Máté Földes, Gábor György Gulyás and Sándor Imre. User Tracking on the Web via Cross-Browser Fingerprinting |
17:00 - 17:15 | Adjourns
|