Papers Papers/2020



Proceedings of the 11th International Conference on Security and Cryptography

August 28-30, 2014, in Vienna, Austria

ISBN: 978-989-758-045-1

ISSN: 2184-2825

Conference Link: http://www.secrypt.icete.org/

Foreword: We warmly welcome you to SECRYPT 2014 - the International Conference on Security and Cryptography, which is held, this year in Vienna, Austria. The SECRYPT 2014 is integrated in the ICETE (International Conference on e-Business and Telecommunications) joint conference, which puts together six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security and privacy, signal processing and multimedia applications, and wireless networks and information systems. Sponsored by INSTICC (the Institute for Systems and Technologies of Information, Control and Communication) and co-organized by the Austrian Computer Society and the Vienna University of Technology, the SECRYPT is technically sponsored by SBA Research and held in cooperation with ACM SIGDOC (Special Interest Group on Design of Communication), ACM SIGSAC (Special Interest Group on Security, Audit and Control) and IACR (International Association for Cryptologic Research). Moreover, it has WfMC (Workflow Management Coalition), OMG (Object Management Group), and FIPA (The Foundation for Intelligent Physical Agents) as an Organizational Sponsors. We would like to emphasize that ICETE 2014 includes five distinguished keynote lectures, delivered by experts in their fields, including (alphabetically): Ivona Brandic (Vienna UT, Austria), Matteo Golfarelli (University of Bologna, Italy), Seymour Goodman (Georgia Institute of Technology, United States), Dimitris Karagiannis (University of Vienna, Austria), and Edgar Weippl (Secure Business Austria - Vienna University of Technology, Austria). With its six segments, we expect it to appeal to a global audience of the engineers, scientists, business practitioners and policy experts, interested in R&D on Telecommunication Systems and Services. All tracks focus on research related to real world applications and rely on contributions not only from academia, but also from industry, business and government, with different solutions for end-user applications and enabling technologies, in a diversity of communication environments. The accepted papers demonstrate a number of new and innovative solutions and the vitality of these research areas. In response to the call for papers, 139 manuscripts were submitted to SECRYPT 2014. The reviewing process was double blind (meaning the identity of the authors was not known to reviewers, and vice-versa). Each paper was reviewed by at least 3 members of the Program Committee. The review process was rigorous and selective, resulting in the acceptance of 13 full papers (9% acceptance rate). With this acceptance ratio, SECRYPT 2014 continues the tradition of previous conferences as a distinguished and high-quality conference. Extended versions of selected best papers of the conference will be invited to appear in a post-conference book that will be published by Springer. A successful conference involves more than paper presentations alone. It is also a meeting place, where ideas about new research projects and other ventures are discussed and debated. Therefore, a social event including a conference dinner/banquet has been planned for evening of August 29th in order to promote this kind of social networking. We would like to express our thanks to all colleagues involved in supporting this conference. . We would like to thank in particular: the members of the Program Committee and the external reviewers, who really did a great job, devoting expertise and time in reviewing the papers and participating in the discussion process. We would like to thank all the authors who submitted papers, whether or not the paper was eventually included in the program. We would like to thank Giovanni Livraga for serving as publicity chair. We would also like to thank the panelists and invited speakers for their invaluable contribution, in sharing their vision, knowledge and research outcomes. Special thanks go to the leadership, faculty and staff of Vienna University of Technology for hosting the conference. Finally, a word of appreciation for the hard work of the INSTICC team; organizing a conference of this level is a task that can only be achieved by the collaborative effort of a dedicated and highly capable team. We hope that the papers accepted and included in the proceedings may be helpful references in future works for all those who need to address topics in security and cryptography, as well as other ICETE knowledge areas. Enjoy the program and your stay in Vienna. (More)


Vol. 1 - 978-989-758-045-1

Show papers

P. 88 - 100

P. 206 - 212

Show authors