The 9Th IFIP International Conference on New Technologies, Mobility and Security 2018Program

The 9Th IFIP International Conference on New Technologies, Mobility and Security 2018Program

The 9th IFIP International Conference on New Technologies, Mobility and Security 2018Program Time Session Monday, February 26 09:00 am-09:30 am Opening Session 09:30 am-10:30 am Keynote: Internet of Nanothings and Bio-Nanothings 10:30 am-11:00 am Coffee Break M1: Cognitive Radio Networks and Channel Measurement, 11:00 am-12:30 pm N1: Next generation systems & Service-oriented techniques , S1: Cryptography: Algorithms, protocols, attacks 12:30 pm-02:00 pm Lunch N2: Interactive media, Context/Content aware Services, 02:00 pm-03:30 pm S2: Cryptography, Privacy, Security and Usability, S3: Security in system evolution, Surveillance and monitoring 03:30 pm-04:00 pm Coffee Break M3: 4G and 5G networks, LTE and LTE-A, 04:00 pm-06:00 pm N3: Smart Homes and Smart Cities, S4: Cloud computing, Security in distributed systems Tuesday, February 27 CID 1: CID Workshop Session 1, 09:00 am-10:30 am N4: Content-based networking, Content Distribution and NGN architectures, S5: Security and Usability 10:30 am-11:00 am Coffee Break CID 2: CID Workshop Session 2, 11:00 am-12:30 pm S6: Surveillance, Monitoring and Intrusion detection, S7: Security engineering: Methodologies, formalism, modeling, tools, code instrumentation 12:30 pm-02:00 pm Lunch 02:00 pm-03:00 pm Keynote 2: Toward open smart IoT Systems: an overview of recent initiatives and future directions 03:30 pm-04:00 pm Coffee Break IP: Invited papers, 04:00 pm-06:00 pm M4: Analysis, Simulation and Performance Evaluation 07:00 pm-11:00 pm Banquet Wednesday, February 28 BSC1: Data Analytics & Cryptocurrency, 09:00 am-10:30 am Tutorial: Applications of Blockchain to Supply Chain and Logistics: emerging trends and new challenges, WSN-ADT: WSN-ADT Workshop 10:30 am-11:00 am Coffee Break BSC2: Smart Contracts, 11:00 am-12:30 pm Tutorial: Applications of Blockchain to Supply Chain and Logistics: emerging trends and new challenges, WSN2: WSN-ADT: WSN-ADT Workshop Section 2 12:30 pm-02:00 pm Lunch 02:00 pm-03:30 pm BSC3: Architecture & Technologies 03:30 pm-04:00 pm Coffee Break 04:00 pm-06:00 pm BSC4: Applications Monday, February 26, 09:00 - 09:30 Opening Session Monday, February 26, 09:30 - 10:30 Keynote: Internet of Nanothings and Bio-Nanothings Monday, February 26, 10:30 - 11:00 Coffee Break Monday, February 26, 11:00 - 12:30 M1: Cognitive Radio Networks and Channel Measurement Spectrum Sharing in Cognitive Radio Systems Raouia Masmoudi (Gaspard Monge Computer Laboratory (LIGM), University Paris Est Marne la Valée & ETIS, University Cergy-Pontoise, ENSEA, CNRS, France) Comparison of the Performance Sensitivity to the Primary and Secondary Service Time Distribution in Cognitive Radio Networks Felipe A. Cruz-Pérez (Cinvestav-IPN, Mexico); José Serrano-Chávez (CINVESTAV, Mexico); S. Lirio Castellanos-Lopez (UAM, Mexico); Genaro Hernandez-Valdez (UAM-A, Mexico) Density-aware Outage in Clustered Ad Hoc Networks Alperen Eroglu (Middle East Technical Universtity, Turkey); Ertan Onur (Middle East Technical University, Turkey); Mehmet Turan (Atılım University, Turkey) MANER: Smart Mesh BLE - Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS) Eyuel Debebe Ayele (University of Twente, The Netherlands & University of Dresden, Germany); Nirvana Meratnia and Paul Havinga (University of Twente, The Netherlands) N1: Next generation systems & Service-oriented techniques Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services Yukinobu Fukushima and Itsuho Goda (Okayama University, Japan); Tutomu Murase (Nagoya University, Japan); Tokumi Yokohira (Okayama University, Japan) Federated Publish/subscribe Services Eirik Bertelsen and Gabriel Berthling-Hansen (Norwegian University of Science and Technology (NTNU), Norway); Trude H Bloebaum (Norwegian Defence Research Establishment (FFI), Norway); Christian Duvholt and Einar Hov (Norwegian University of Science and Technology (NTNU), Norway); Frank T. Johnsen (Norwegian Defence Research Establishment (FFI), Norway); Eivind Morch and Andreas Weisethaunet (Norwegian University of Science and Technology (NTNU), Norway) An Extension of Radio Network Information Interfaces for Terminal Activity in a Cell Evelina Pencheva and Ivaylo Atanasov (Technical University of Sofia, Bulgaria) S1: Cryptography: Algorithms, protocols, attacks Policy-controlled Signature from NTRU Lattice Zi-Yuan Liu, Jen-Chieh Hsu and Raylin Tso (National Chengchi University, Taiwan) Oblivious Transfer Protocols based on Commutative Encryption Jen-Chieh Hsu (Nation Chengchi University, Taiwan); Raylin Tso (National Chengchi University, Taiwan); Yu- Chi Chen (Yuan Ze University, Taiwan); Mu-En Wu (National Taipei University of Technology, Taiwan) Two-level chaotic system versus non-autonomous modulation in the context of chaotic voice encryption Mahmoud Abd Elzaher (Ain Shams University, Egypt) Monday, February 26, 12:30 - 14:00 Lunch Monday, February 26, 14:00 - 15:30 N2: Interactive media, Context/Content aware Services ProsocialLearn: a Prosocial Games Marketplace Francesco D'Andria and Jose Miguel Garrido (ATOS, Spain); Michael Boniface (University of Southampton, United Kingdom (Great Britain)); Lee Middleton (IT innovation Centre & University of Southampton, United Kingdom (Great Britain)); Simon Crowle (University of Southampton, United Kingdom (Great Britain)); Stefano Modafferi (Southampton University, United Kingdom (Great Britain)); Petros Daras (Centre for Research and Technology Hellas, Greece); Kosmas Dimitropoulos(Centre for Research and Technology Hellas, Informatics and Telematics Institute, Greece); Konstantinos Apostolakis (Centre for Research and Technology Hellas, Greece) An Entropy-Based Inverse Tone Mapping Operator for High Dynamic Range Applications Pedram Mohammadi (University of British Columbia, Canada); Mahsa T Pourazad (TELUS Communications Company, Canada); Panos Nasiopoulos (University of British Columbia, Canada) Selectively Accessing Light Field Face Images over Information Centric Networking José Quevedo (Instituto de Telecomunicações & Universidade de Aveiro, Portugal); Carlos Eduardo Magalhães Guimarães (Instituto de Telecomunicações - Pólo de Aveiro, Portugal); Rui Ferreira (Instituto de Telecomunicações, Portugal); Alireza Sepas-Moghaddam(Instituto de Telecomunicacoes, Instituto Superior Tecnico, Portugal); Luis Malhadas (Instituto de Telecomunicações and Instituto Superior Técnico, Portugal); Rui L Aguiar(University of Aveiro & Instituto de Telecomunicações, Portugal); Paulo Lobato Correia (Instituto Superior Tecnico - Universidade Tecnica Lisboa & Instituto de Telecomunicacoes, Portugal); Daniel Corujo (Instituto de Telecomunicações Aveiro & Universidade de Aveiro, Portugal) S2: Cryptography, Privacy, Security and Usability Horizontal Address-Bit DEMA against ECDSA Ievgen Kabin (IHP, Germany); Zoya Dyka (Innovations for High Performance Microelectronics & IHP, Germany); Dan Kreiser (IHP, Germany); Peter Langendoerfer (IHP Microelectronics, Germany) An Authenticated Encrypted Compressive Sensing based Imaging Mechanism Tao Wu and Christoph Ruland (University of Siegen, Germany) Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks Juan E Rubio, Cristina Alcaraz Tello and Javier Lopez(University of Malaga, Spain) Privacy Preserving Queries on Directed Graph Sara Ramezanian, Tommi Meskanen and Valtteri Niemi(University of Helsinki, Finland) S3: Security in system evolution, Surveillance and monitoring Slice Distance: An Insert-only Levenshtein Distance with a Focus on Security Applications Zeeshan Afzal, Johan Garcia, Stefan Lindskog and Anna Brunstrom (Karlstad University, Sweden) The Penetration of OpenSSH Remote Secure Shell Service On Raspberry Pi 2 Hesham H. Alsaadi (Zayed University, United Arab Emirates); Monther Aldwairi (Zayed University & Jordan University of Science and Technology, United Arab Emirates); May Al Taei, Mansoor Al Buainain and Maktoom AlKubaisi (Zayed University, United Arab Emirates) Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files Johan Garcia (Karlstad University, Sweden) Monday, February 26, 15:30 - 16:00 Coffee Break Monday, February 26, 16:00 - 18:00 M3: 4G and 5G networks, LTE and LTE-A Evolving AL-FEC application towards 5G NGMN Christos J Bouras (University of Patras CTI&P-Diophantus & University of Patras, Greece); Nikolaos Kanakis(University of Patras, Greece) A Graph Theory Based Network Selection Algorithm In Heterogeneous Wireless Networks Lahby Mohamed (Ecole Normale Supérieure (ENS) de Casablanca, Morocco); Abderrahim Sekkaki (University, Morocco) Bézier curves based novel calibration technique of beamformers in IEEE 802.11 Wlan networks Mehdi Guessous and Lahbib Zenkouar (Mohammadia Engineering School, Morocco) Mobility-based Tracking Using WiFi RSS in Indoor Wireless Sensor Networks Daniel AlShamaa and Farah Mourad-Chehade (Université de Technologie de Troyes, France); Paul Honeine(Université de Rouen, France) SDN-based Mobility Management: Handover Performance Impact in Constrained Devices Flávio Meneses (Instituto de Telecomunicações & Universidade de Aveiro, Portugal); Carlos Eduardo Magalhães Guimarães (Instituto de Telecomunicações - Pólo de Aveiro, Portugal); Daniel Corujo (Instituto de Telecomunicações Aveiro & Universidade de Aveiro, Portugal); Rui L Aguiar (University of Aveiro & Instituto de Telecomunicações, Portugal) N3: Smart Homes and Smart Cities Improving flexibility in Wireless Sensor Networks via API. An application in ambient monitoring Manuel Jesús Espinosa-Gavira, MJEG

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us