WS5-1:
Cryptography and Information Security
Date: 0930-1030 Friday 12 Dec. 2014
Location:
H105
Session
Chair: TBD
#1117: An Efficient Authentication and Service
Key Agreement Scheme in IOT Environments
Jheng-Jia Huang, Wen-Shenq
Juang, and Chun-I Fan
#1013: Efficient Public Key Encryption with
User-friendly Keywords Search for Searchable Cloud Storage
Kuo-Chang Chen, Yu-Chi Chen,
Gwoboa Horng, and Raylin Tso
#1023: Reversible Data Hiding Method Based On
CSD Data Representation
Shuenn-Shyang Wang, Kuo-Hui
Li, Chien-Sung Li, and Yi Pin Liao
#1242: Classification of Generalized Graph-type
(2,n)-Visual Secret Sharing Schemes and Optimal Construction For Multiple
Secrets
Yuji Suga
WS5-2:
Cryptography and Information Security
Date: 1300-1430
Friday 12 Dec. 2014
Location:
H105
Session
Chair: TBD
#1217: A Privacy-Preserving Encoding For E
Cient Comparison Queries and Access Control from Predicate Encryption
Shao-Heng Chen, Fu-Kuo Tseng,
and Rong-Jaye Chen
#1074: Heap Spraying Revelation: Heap-spraying
Detection Based on Minimal Length Sequence Finding and Argument Analysis
Pei-Chen Yeh, Hahn-Ming Lee,
Hsiao-Rong Tyan, Kuo-Ping Wu, and Jiunn-Chin Wang
#1128: Detecting Malware in Malicious Virtual
Machines using Tensor Analysis Techniques
Tien-Ruey Hsiang, Ting-Yao
Chang, Wei-Yu Lai, and Ching-Hao Mao
#1230: A Trustworthy Assurance-as-a-Service
Architecture
Mahalingam Ramkumar and Somya
Mohanty
#1233: On the Effectiveness of Scheduling Fuzz
Testing
Wei-Jun Chen, Hsiao-Rong Tyan,
and Shih-Kun Huang
#1028: A New Investigation Approach for Tracing
Source IP in DDoS Attack from Proxy Server
Jai-Rong Sun and Min-Shiang
Hwang
WS5-3:
Cryptography and Information Security
Date: 1440-1600
Friday 12 Dec. 2014
Location:
H105
Session
Chair: Chia-Chen Lin, Providence University, Taiwan
#1188: Regulatory Framework for Information
Security in Taiwan's New Personal Information Protection Act of 2012
Wei-Min Liao
#1115: Efficiently Tracking TANET Suspicious
Packets and Identifying the Devices using Splunk
Hung-Yu Chien, Meng-Yuan
Chiang, Yi-Ting Hsin, and Chun-Pei Hung
#1202: A High Capacity Reversible
Multiple-Image Hiding Scheme
Chin-Feng Lee, Jui-Yu Chen,
and Si-Ting Chen
#1007: Information Hiding Scheme Based On
Replace Function and Wavelet Transform
Tzu-Chuen Lu, Sue-Chen Hsueh,
Chun-Ya Tseng, and Pei-Lun Chen
#1070: Hybrid Intrusion Detection Framework for
Advanced Metering Infrastructure
He-Ming Ruan, Gan-Wei Yeap,
and Chin-Laung Lei
WS5-4:
Cryptography and Information Security
Date: 1540-1700
Saturday 13 Dec. 2014
Location:
H103
Session
Chair: TBD
#1121: Frameworks in Evidence Collection in
Forensics by Analyzing Temporal Cloud Storage Forensics
Da-Yu Kao, Min-Jung Chung, and
Shiuh-Jeng Wang
#1127: Design of Proxy Signature Schemes using
Self-Certified Public Keys from Pairings
Chien-Lung Hsu, Yu-Hao Chuang,
and Pei-Ling Tsai
#1033: An Efficient Honeypot Based Malware
Classification System
Gu-Hsin Lai and Chia-Mei Chen
#1022: WSD-AIS: An Artificial Immune System
Approach Against Web Spam
Yan Zhu, Fan Yang, and
Shouhong Tang
#1118: On Reversible Data Hiding Schemes for
JPEG Images from the Modified Quantization Table
Hsin-Lung Wu, Jen-Chun Chang,
and Chen-Hsuan Lee
#1273: A Comparative Survey on RFID Grouping
Authentication Protocols
Jian Shen, Haowen Tan, Sai Ji,
Yongjun Ren, and Jin Wang