SAM'14: Wednesday, July 23, 2014 Schedule
Last modified
2014-07-16 19:43
To select a different schedule ![]() |
06:45a - 05:00p: REGISTRATION (Second Floor, Conference Lobby: 1-5) SESSION 8-SAM: CRYPTOGRAPHIC TECHNOLOGIES I Chair: Prof. Michael Grimaila; Air Force Institute of Technology, Wright-Patterson AFB, Ohio, USA July 23, 2014 (Wednesday); 08:00am - 09:20am (LOCATION: Ballroom 2) 08:00 - 08:20am: Modeling Continuous Time Optical Pulses in a Quantum Key Distribution Discrete Event Simulation Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Colin McLaughlin Air Force Institute of Technology, AFIT/ENV, Wright-Patterson AFB, Ohio, USA 08:20 - 08:40am: A Survey on Certificateless Encryption Techniques Fahad T. Bin Muhaya King Saud University, Riyadh, Kingdom of Saudi Arabia 08:40 - 09:00am: XXX FREE SLOT 09:00 - 09:20am: Privacy-Preserving Protocol for Reduced Cancer Risk on Daily Physical Activity Hiroaki Kikuchi, Shigeta Ikuji, Manami Inoue Mathematical Sciences, Meiji University, Tokyo, Japan; Cyber Communication Inc., Minato-ku, Tokyo, Japan; National Cancer Center, Chuo-ku, Tokyo, Japan SESSION 9-SAM & 10-SAM: CRYPTOGRAPHIC TECHNOLOGIES II + SECURITY MANAGEMENT I Co-Chairs: Prof. Nizar Al Holou, University of Detroit Mercy, USA Dr. Mehmet Sahinoglu, Auburn University, Montgomery, USA XXX July 23, 2014 (Wednesday); 09:20am - 12:00pm (LOCATION: Ballroom 2) 09:20 - 09:40am: Formal Verification of Improved Numeric Comparison Protocol for Secure Simple Paring in Bluetooth Using ProVerif Kenichi Arai, Toshinobu Kaneko Tokyo University of Science, Yamazaki Noda-City, Chiba, Japan 09:40 - 10:00am: Digital Identities and Accountable Agreements in Web Applications Joona Kannisto, Takeshi Takahashiy, Jarmo Harju Tampere University of Technology, Tampere, Finland; National Institute of Info. & Communications Tech., Tokyo, Japan 10:00 - 10:20am: A Quantitative Index for Software Application Security Risk Mehmet Sahinoglu, Stephen Stockton, Scott Morton, David Ang Informatics Institute, Auburn University at Montgomery, Alabama, USA 10:20 - 10:40am: BREAK 10:40 - 11:00am: An Interoperability Framework for Security Policy Languages Amir Aryanpour, Edmond Parkash, Andrew Harmel-Law, Scott Davies Bedfordshire University, University Square, Luton, UK 11:00 - 11:20am: The Implementation of BGP Monitoring, Alarming, and Protecting System by BGP-UPDATE-Based Method Using ECOMMUNITY in Real Time Je-Kuk Yun, BeomSeok Hong, Yanggon Kim Information Technology, Towson University, Towson, Maryland, USA 11:20 - 11:40am: FREE SLOT 11:40 - 12:00pm: FREE SLOT 12:00 - 01:20pm: LUNCH (On Your Own) SESSION 11-SAM: SECURITY MANAGEMENT II + SECURITY EDUCATION Chair: Dr. Diala Abi Haidar; Dar Al Hekma University, Saudi Arabia July 23, 2014 (Wednesday); 01:20pm - 03:00pm (LOCATION: Ballroom 2) 01:20 - 01:40pm: Security Management of Bring-Your-Own-Devices Sara Gallotto, Weifeng Chen Southern New Hampshire University, Manchester, New Hampshire, USA; California University of Pennsylvania, California, Pennsylvania, USA 01:40 - 02:00pm: SIPPA Approach Towards a Privacy Preserving Voice-based Identity Solution Bon K. Sy Queens College & University Graduate Center, Flushing, New York, USA 02:00 - 02:20pm: Creating a Policy Based Network Intrusion Detection System Using Java Platform Samuel N. John, Charles U. Ndujiuba, Robert E. Okonigene, Chinonso E. Okereke, Miebaka E. Wakama Covenant University, Ogun State, Nigeria; Ambrose Alli University, Edo State, Nigeria 02:20 - 02:40pm: LearnFire: A Firewall Learning Tool for Undergraduate Cybersecurity Courses Alicia Kirkland, Jens Mache Lewis & Clark College, Portland, Oregon, USA 02:40 - 03:00pm: Teaching Cybersecurity to Wide Audiences with Table-Top Games Tadhg Fendt, Jens Mache Lewis & Clark College, Portland, Oregon, USA 03:00 - 03:40pm: BREAK & POSTER/DISCUSSION SESSION B-SAM July 23, 2014 (Wednesday) (LOCATION: Hallways of Ballrooms 1-5) O. Steganography Through Block IO Joe Jevnik, Leonidas Deligiannidis Wentworth Institute of Technology, Boston, Massachusetts, USA 0. A Formal Data Flow Model to Study Network Protocol Encapsulation Inconsistencies Francois Barrere, Romain Laborde, Hicham Elkhoury, Abdelmalek Benzekri IRIT Laboratory - Toulouse University, Route de Narbonne, France O. ... SESSION 12-SAM: BIOMETRICS AND FORENSICS II Chair: Prof. Craig Valli, Edith Cowan University, Australia July 23, 2014 (Wednesday); 03:40pm - 06:00pm (LOCATION: Ballroom 2) 03:40 - 04:00pm: XXX FREE SLOT 04:00 - 04:20pm: A Framework for Leveraging Cloud Computing to Facilitate Biometrics at Large-Scale John K. Mitchell III, Syed S. Rizvi Pennsylvania State University, Altoona, Pennsylvania, USA 04:20 - 04:40pm: Exploring Digital Forensics Tools in Backtrack 5.0 r3 Ahmad Ghafarian, Syed Amin Hosseini Seno University of North Georgia, Dahlonega, Georgia, USA; Ferdowsi University of Mashhad, Virtual Study Center, Mashhad, Iran 04:40 - 05:00pm: A Method for Authentication Using Behavior Biometrics on WEB Hiroshi Dozono, Naoto Yamasaki, Masanori Nakakuni Saga University, Japan; Fukuoka University, Fukuoka, Japan 05:00 - 05:20pm: FREE SLOT 05:20 - 05:40pm: FREE SLOT 05:40 - 06:00pm: FREE SLOT 06:00 - 09:00pm: TUTORIALS + PANEL DISCUSSIONS + ADDITIONAL INVITED LECTURES
To select a different schedule ![]() |