Personal tools
  •  
You are here: Home Program SAM'13: Tuesday, July 23, 2013 Schedule
Conference Proceedings
Get WORLDCOMP'13 & '14 Proceedings
Click Here

Photo Galleries

Important Dates
July 17, 2013
Registration Deadline

July 22-25, 2013
The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing


« September 2015 »
Su Mo Tu We Th Fr Sa
12345
6789101112
13141516171819
20212223242526
27282930
 

SAM'13: Tuesday, July 23, 2013 Schedule

Last modified 2013-07-10 20:00

To select a different schedule CLICK HERE


SESSION 4-SAM:    CRYPTOGRAPHIC TECHNOLOGIES I
                  Chair: Dr. Levent Ertaul, California State University, USA
                  East Bay, USA
                  July 23, 2013 (Tuesday); 08:00am - 10:20pm
                  (LOCATION: Cohiba 11)

08:00 - 08:20am:  Towards An Efficient Protocol for Privacy and Authentication in
                  Wireless Networks
                  Clifton Mulkey, Dulal Kar, Ajay Katangur
                  Texas A&M University-Corpus Christi, Texas, USA

08:20 - 08:40am:  A Robust User Authentication Scheme for Multi- Server Environment
                  Using Smart Cards
                  Tien-Ho Chen, Hsiu-lien Yeh, Tseng-Yi Chen, Wei-Kuan Shih
                  National Tsing Hua University, Hsinchu, Taiwan

08:40 - 09:00am:  Secure Wireless Fax Module
                  Shakeel Durrani, Rida Amee, Imran Jattala, Nassar Ikram
                  Horizon Tech Services Islamabad, Pakistan

09:00 - 09:20am:  Elliptic Curve Cryptography Coprocessor for Mobile Ad-Hoc Networks
                  Micho Radovnikovich and Debatosh Debnath
                  Department of Electrical and Computer Engineering,
                  Oakland University, Rochetser, Michigan, USA

09:20 - 09:40am:  Investigation of System Performance of Quantum Cryptography Key
                  Distribution in Network Security
                  Mehrdad S. Sharbaf
                  CSUDH, Computer Science Department, Carson, California, USA

09:40 - 10:00am:  Securing RTP Packets Using Persistent Packet Key Encryption Scheme
                  For Real-Time Multimedia Applications
                  Younchan Jung and Enrique Festijo
                  School of Information, Communications & Electronics Engineering,
                  Catholic University of Korea, Gyeonggi-do, Korea

10:00 - 10:20am:  Using Secure Multi-Party Computation When Processing Distributed
                  Health Data
                  Anders Andersen
                  University of Tromso, Tromso, Norway

10:20 - 11:00am:  POSTER/DISCUSSION SESSION A-SAM
                  July 23, 2013 (Tuesday)
                  (LOCATION: Cohiba 8-9)

                  O.  Integrative Security for Java EE Web Applications
                      Thorsten Kisner and Helge Hemmer
                      Management and Engineering, AHT Group AG, Essen, Germany
                  O.  HPA Lab: An Open-Source Educational Tool to Explore Host Protected
                      Areas Under Linux
                      L. Markowsky
                      University of Maine, Orono, Maine, USA
                  O.  Design and Implementation of Broker System for Protect Privacy
                      Information
                      Sung-Jun Kim and Joon Woo
                      KISTI, Korea

SESSION 5-SAM:    SYSTEMS ENGINEERING AND SECURITY + COMPUTER SECURITY + NETWORK SECURITY
                  Chair: Dr. Michael R. Grimaila, Air Force Institute of Technology, USA
                  July 23, 2013 (Tuesday); 11:00am - 12:20pm
                  (LOCATION: Cohiba 11)

11:00 - 11:20am:  New Quasigroup Based Random Number Generator
                  Matthew Battey, Abhishek Parakh, William Mahoney
                  University of Nebraska at Omaha, Omaha, Nebraska, USA

11:20 - 11:40am:  A Systems Engineering Approach for Assured Cyber Systems
                  Logan Mailloux, Brent Langhals, Michael Grimaila
                  Air Force Institute of Technology, AFIT/ENV, WPAFB, Ohio, USA

11:40 - 12:00pm:  A Load Service Structure Using a P2P Network Based Reputation System
                  in Ad-hoc Networks
                  Ming-Chang Huang
                  University of North Carolina at Charlotte, North Carolina, USA

12:00 - 12:20pm:  FREE SLOT

12:20 - 01:20pm:  LUNCH (On Your Own)

SESSION 6-SAM:    COMPUTER SECURITY II
                  Dr. Rita Barrios, University of Detroit Mercy, USA
                  July 23, 2013 (Tuesday); 01:20am - 03:00pm
                  (LOCATION: Cohiba 11)

01:20 - 01:40pm:  FREE SLOT

01:40 - 02:00pm:  Correlation Analysis of Cyber Threat Information in Heterogeneous
                  Security Systems
                  Jae-Kook Lee and Chae-Tae Im
                  Applied Security Technology Team, Korea Internet and Security
                  Agency, Seoul, Korea

02:00 - 02:20pm:  Towards a Service Migration Architecture for Service Availability
                  Yanjun Zuo
                  University of North Dakota, Grand Forks, North Dakota, USA

02:20 - 02:40pm:  FAPA: A Model to Prevent Flooding Attacks in Clouds
                  Kazi Zunnurhain and Susan V. Vrbsky
                  The University of Alabama Tuscaloosa, Alabama, USA

02:40 - 03:00pm:  Detecting the Insider Threat: Going Beyond the Network Layer
                  Rita M. Barrios
                  Computer Information Systems - Cyber Security, University of
                  Detroit Mercy, Detroit, Michigan, USA

03:00 - 03:20pm:  BREAK

SESSION 7-SAM:    CRYPTOGRAPHIC TECHNOLOGIES II
                  Chair: Dr. Cristina Soviany, IDES Technologies, Belgium
                  July 23, 2013 (Tuesday); 03:20pm - 05:40pm
                  (LOCATION: Cohiba 11)

03:20 - 03:40pm:  FREE SLOT

03:40 - 04:00pm:  Implementing the ECC Brainpool Curve Generation Procedure Using
                  Open Source Software
                  V. Gayoso Martinez and L. Hernandez Encinas
                  Information Security Institute, Spanish National Research Council
                  (CSIC), Serrano, Madrid, Spain

04:00 - 04:20pm:  Power and Electromagnetic Analysis Attack on a Smart Card
                  Implementation of CLEFIA
                  Yongdae Kim, Jaehwan Ahn, Heebong Choi
                  The Attached Institute of Electronics and Telecommunications,
                  Research Institute, Daejeon, Korea

04:20 - 04:40pm:  Prime Base, Prime Moduli PRN Generator
                  Palak Thakkar, Scott Imhoff, John Harms
                  Raytheon Company, Intelligence and Information Systems, Colorado, USA

04:40 - 05:00pm:  Cryptographic Technologies Track: Verifiable Symmetric Searchable
                  Encryption for Multiple Groups of Users
                  Zachary A. Kissel and Jie Wang
                  University of Massachusetts Lowell, Massachusetts, USA

05:00 - 05:20pm:  Verifiable Dynamic Multi-Secret Sharing Scheme
                  Aditya Nalwaya, P. D. Vyavahare, Manish Panchal
                  Department of Electronics and Telecommunication Engineering, S.G.S.
                  Institute Of Technology and Science, Indore, India

05:20 - 05:40pm:  Advanced Data Encryption Standard: Overcoming Deficiencies of DES
                  Chadi Riman and Hicham H. Hallal
                  Fahad Bin Sultan University Tabuk, Saudi Arabia



To select a different schedule CLICK HERE
Current Event
WORLDCOMP'15
Click Here

Past Events
WORLDCOMP'14
Click Here

WORLDCOMP'12
Click Here

WORLDCOMP'11
Click Here

WORLDCOMP'10
Click Here

WORLDCOMP'09
Click Here

WORLDCOMP'08
Click Here

WORLDCOMP'07 & '06
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events




 


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)