time room a room b room c - ntms-conf.org · cid workshop s1 10:30 – 11:00 coffee break 11:00 –...

12
Time Room A Room B Room C Monday, February 26 09:00 09:30 Opening Session (Room A) 09:30 10:30 Keynote: Internet of Nanothings and Bio-Nanothings (Room A) 10:30 11:00 Coffee Break 11:00 12:30 Next generation systems & Service-oriented techniques Cryptography: Algorithms, protocols, attacks Cognitive Radio Networks and Channel Measurement 12:30 14:00 Lunch 14:00 15:30 Interactive media, Context/Content aware Services Security in system evolution, Surveillance and monitoring 15:30 16:00 Coffee Break 16:00 18:00 Content-based networking, Content Distribution and NGN architectures Cloud computing, Security in distributed systems 4G and 5G networks, LTE and LTE-A Tuesday, February 27 09:00 10:30 Smart Homes and Smart Cities Security and Usability CID Workshop S1 10:30 11:00 Coffee Break 11:00 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies, formalism, modeling, tools CID Workshop S2 12:30 14:00 Lunch 14:00 15:00 Keynote 2: Toward open smart IoT Systems: an overview of recent initiatives and future directions (Room A) 15:30 16:00 Coffee Break 16:00 18:00 Analysis, Simulation and Performance Evaluation Cryptography, Privacy, Security and Usability Invited Papers 19:00 23:00 Banquet Wednesday, February 28 09:00 10:30 Tutorial 1: Applications of Blockchain to Supply Chain and Logistics: emerging trends and new challenges BSC1: Data Analytics & Cryptocurrency 10:30 11:00 Coffee Break 11:00 12:30 Tutorial 1 BSC2: Smart Contracts 12:30 14:00 Lunch 14:00 15:30 BSC3: Architecture & Technologies 15:30 16:00 Coffee Break 16:00 18:00 BSC4: Applications

Upload: others

Post on 25-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

Time Room A Room B Room C

Monday, February 26

09:00 – 09:30 Opening Session (Room A)

09:30 – 10:30 Keynote: Internet of Nanothings and Bio-Nanothings (Room A)

10:30 – 11:00 Coffee Break

11:00 –12:30 Next generation systems & Service-oriented techniques

Cryptography: Algorithms, protocols, attacks

Cognitive Radio Networks and Channel

Measurement

12:30 – 14:00 Lunch

14:00 – 15:30 Interactive media,

Context/Content aware Services

Security in system evolution, Surveillance and monitoring

15:30 – 16:00 Coffee Break

16:00 – 18:00 Content-based networking,

Content Distribution and NGN architectures

Cloud computing, Security in distributed systems

4G and 5G networks, LTE and LTE-A

Tuesday, February 27

09:00 – 10:30 Smart Homes and Smart Cities Security and Usability CID Workshop S1

10:30 – 11:00 Coffee Break

11:00 – 12:30 Surveillance, Monitoring and

Intrusion detection

Security engineering: Methodologies, formalism,

modeling, tools

CID Workshop S2

12:30 – 14:00 Lunch

14:00 – 15:00 Keynote 2: Toward open smart IoT Systems: an overview of recent initiatives and future

directions (Room A)

15:30 – 16:00 Coffee Break

16:00 – 18:00 Analysis, Simulation and Performance Evaluation

Cryptography, Privacy, Security and Usability

Invited Papers

19:00 – 23:00 Banquet

Wednesday, February 28

09:00 – 10:30

Tutorial 1: Applications of Blockchain to Supply Chain

and Logistics: emerging trends and new challenges

BSC1: Data Analytics & Cryptocurrency

10:30 – 11:00 Coffee Break

11:00 – 12:30 Tutorial 1 BSC2: Smart Contracts

12:30 – 14:00 Lunch

14:00 – 15:30 BSC3: Architecture & Technologies

15:30 – 16:00 Coffee Break

16:00 – 18:00 BSC4: Applications

Page 2: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

Monday, February 26

09:00 - 09:30

Opening Session

Room A

09:30 - 10:30

Keynote: Internet of Nanothings and Bio-Nanothings

Room A

Chair: Rui L Aguiar (University of Aveiro & Instituto de Telecomunicações, Portugal)

10:30 - 11:00

Coffee Break

11:00 - 12:30

M1: Cognitive Radio Networks and Channel Measurement

Room C

Chair: Pascal Lorenz (University of Haute Alsace, France)

Spectrum Sharing in Cognitive Radio Systems

Raouia Masmoudi (Gaspard Monge Computer Laboratory (LIGM), University Paris Est Marne la Valée & ETIS, University Cergy-Pontoise, ENSEA, CNRS, France)

Comparison of the Performance Sensitivity to the Primary and Secondary Service Time Distribution in Cognitive Radio Networks

Felipe A. Cruz-Pérez (Cinvestav-IPN, Mexico); José Serrano-Chávez (CINVESTAV, Mexico); S. Lirio Castellanos-Lopez (UAM, Mexico); Genaro Hernandez-Valdez (UAM-A, Mexico)

Density-aware Outage in Clustered Ad Hoc Networks Alperen Eroglu (Middle East Technical Universtity, Turkey); Ertan Onur (Middle East Technical University, Turkey); Mehmet Turan (Atılım University, Turkey)

MANER: Smart Mesh BLE - Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS)

Eyuel Debebe Ayele (University of Twente, The Netherlands & University of Dresden, Germany); Nirvana Meratnia and Paul Havinga (University of Twente, The Netherlands)

N1: Next generation systems & Service-oriented techniques

Room A

Chair: Panos Nasiopoulos (University of British Columbia, Canada)

Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services Yukinobu Fukushima and Itsuho Goda (Okayama University, Japan); Tutomu Murase (Nagoya University, Japan); Tokumi Yokohira (Okayama University, Japan)

Federated Publish/subscribe Services

Eirik Bertelsen and Gabriel Berthling-Hansen (Norwegian University of Science and Technology (NTNU), Norway); Trude H Bloebaum (Norwegian Defence Research Establishment (FFI), Norway); Christian Duvholt and Einar Hov (NTNU, Norway); Frank T. Johnsen (FFI, Norway); Eivind Morch and Andreas Weisethaunet (NTNU, Norway)

Page 3: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

An Extension of Radio Network Information Interfaces for Terminal Activity in a Cell Evelina Pencheva and Ivaylo Atanasov (Technical University of Sofia, Bulgaria)

S1: Cryptography: Algorithms, protocols, attacks

Room B

Chair: Francesco D'Andria (ATOS, Spain)

Policy-controlled Signature from NTRU Lattice

Zi-Yuan Liu, Jen-Chieh Hsu and Raylin Tso (National Chengchi University, Taiwan); Tzong-Chen WU (National Taiwan University of Science & Technology, Taiwan)

Oblivious Transfer Protocols based on Commutative Encryption Jen-Chieh Hsu (Nation Chengchi University, Taiwan); Raylin Tso (National Chengchi University, Taiwan); Yu-Chi Chen (Yuan Ze University, Taiwan); Mu-En Wu (National Taipei University of Technology, Taiwan)

Two-level chaotic system versus non-autonomous modulation in the context of chaotic voice encryption

Mahmoud Abd Elzaher (Ain Shams University, Egypt)

12:30 - 14:00

Lunch

14:00 - 15:30

N2: Interactive media, Context/Content aware Services

Room A

Chair: Gary Steri (European Commission Joint Research Centre, Italy)

ProsocialLearn: a Prosocial Games Marketplace Francesco D'Andria and Jose Miguel Garrido (ATOS, Spain); Michael Boniface (University of Southampton, United Kingdom (Great Britain)); Lee Middleton (IT innovation Centre & University of Southampton, United Kingdom (Great Britain)); Simon Crowle and ; Stefano Modafferi (University of Southampton, United Kingdom (Great Britain)); Petros Daras Kosmas Dimitropoulos ; Konstantinos Apostolakis (Centre for Research and Technology Hellas, Greece);

An Entropy-Based Inverse Tone Mapping Operator for High Dynamic Range Applications

Pedram Mohammadi (University of British Columbia, Canada); Mahsa T Pourazad (TELUS Communications Company, Canada); Panos Nasiopoulos (University of British Columbia, Canada)

Selectively Accessing Light Field Face Images over Information Centric Networking

José Quevedo; Carlos Eduardo Magalhães Guimarães; Rui Ferreira; Alireza Sepas-Moghaddam; Luis Malhadas (Instituto de Telecomunicações and Instituto Superior Técnico, Portugal); Rui L Aguiar (University of Aveiro & Instituto de Telecomunicações, Portugal); Paulo Lobato Correia (Instituto Superior Tecnico - Universidade Tecnica Lisboa & Instituto de Telecomunicacoes, Portugal); Daniel Corujo (Instituto de Telecomunicações Aveiro & Universidade de Aveiro, Portugal)

S2: Security in system evolution, Surveillance and monitoring

Room B

Chair: Takoua Abdellatif (Carthage University, Tunisia)

Slice Distance: An Insert-only Levenshtein Distance with a Focus on Security Applications Zeeshan Afzal, Johan Garcia, Stefan Lindskog and Anna Brunstrom (Karlstad University, Sweden)

Page 4: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

The Penetration of OpenSSH Remote Secure Shell Service On Raspberry Pi 2 Hesham H. Alsaadi (Zayed University, United Arab Emirates); Monther Aldwairi (Zayed University & Jordan University of Science and Technology, United Arab Emirates); May Al Taei, Mansoor Al Buainain and Maktoom AlKubaisi (Zayed University, United Arab Emirates)

Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files Johan Garcia (Karlstad University, Sweden)

WSN-ADT: WSN-ADT Workshop

Room D

Chair: Abed Ellatif Samhat (Lebanese University, Lebanon)

Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks

Andreas Brokalakis (Synelixis, Greece); Ioannis Papaefstathiou (Technical University of Crete & Synelixis Solutions Ltd., Greece); Ioannis Chondroulis (Technical University of Crete, Greece)

Using Dynamic Occupancy Patterns for Improved Presence Detection In Intelligent Buildings Charikleia Papatsimpa (TU/e, The Netherlands); Jean-Paul Linnartz (Technische Universiteit Eindhoven, The Netherlands)

Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System Eyuel Debebe Ayele (University of Twente, The Netherlands & University of Dresden, Germany); Nirvana Meratnia and Paul Havinga (University of Twente, The Netherlands)

15:30 - 16:00

Coffee Break

16:00 - 18:00

M2: 4G and 5G networks, LTE and LTE-A

Room C

Chair: Lahby Mohamed (Ecole normale supérieure (ENS) Casablanca, Maroc)

Evolving AL-FEC application towards 5G NGMN Christos J Bouras (University of Patras CTI&P-Diophantus & University of Patras, Greece); Nikolaos Kanakis (University of Patras, Greece)

A Graph Theory Based Network Selection Algorithm In Heterogeneous Wireless Networks Lahby Mohamed (Ecole Normale Supérieure (ENS) de Casablanca, Morocco); Abderrahim Sekkaki (University, Morocco)

Bézier curves based novel calibration technique of beamformers in IEEE 802.11 Wlan networks Mehdi Guessous and Lahbib Zenkouar (Mohammadia Engineering School, Morocco)

Mobility-based Tracking Using WiFi RSS in Indoor Wireless Sensor Networks Daniel AlShamaa and Farah Mourad-Chehade (Université de Technologie de Troyes, France); Paul Honeine (Université de Rouen, France)

SDN-based Mobility Management: Handover Performance Impact in Constrained Devices Flávio Meneses (Instituto de Telecomunicações & Universidade de Aveiro, Portugal); Carlos Eduardo Magalhães Guimarães (Instituto de Telecomunicações - Pólo de Aveiro, Portugal); Daniel Corujo (Instituto de Telecomunicações Aveiro & Universidade de Aveiro, Portugal); Rui L Aguiar (University of Aveiro & Instituto de Telecomunicações, Portugal)

Page 5: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

N3: Content-based networking, Content Distribution and NGN architectures

Room A

Chair: Christian Jacquenet (Orange Labs, France), Dong Kyoo Kim (ETRI, Korea)

A Many-To-One Matching Game Approach To Achieve Low-Latency Exploiting Fogs And Caching

Bouchaib Assila, Mr; Abdellatif Kobbane and Mohammed El Koutbi (ENSIAS, Mohammed V University of Rabat, Morocco)

Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification

Gianmarco Baldini (Joint Research Centre - European Commission, Italy); Raimondo Giuliani (EC JRC, Italy); Claudio Gentile (Università degli Studi dell'Insubria, Italy); Gary Steri (European Commission Joint Research Centre, Italy)

CliMBOS: A Modular NFV Cloud Backend for the Internet of Things Massimo Gallo (Bell Labs, NOKIA, France); Samir Ghamri-Doudane and Fabio Pianese (Nokia Bell Labs, France)

A Network Management Framework for SDN Sarah Abdallah, Imad H Elhajj, Ali Chehab and Ayman Kayssi (American University of Beirut, Lebanon)

S3: Cloud computing, Security in distributed systems

Room B

Chair: Houda Labiod (TELECOM ParisTech, France)

A New Dynamic Trust Model for "On Cloud" Federated Identity Management

Keltoum Bendiab (Frères Mentouri University, Algeria); Stavros Shiaeles (Plymouth University, United Kingdom (Great Britain)); Samia Boucherkha (Abdelhamid Mehri University Constantine, Algeria)

Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing

Louis Tajan, Moritz Kaumanns and Dirk Westhoff (Hochschule Offenburg University of Applied Sciences, Germany)

Fast Evaluation of Homomorphic Encryption Schemes based on Ring-LWE Cyrielle Feron (ENSTA Bretagne, Lab-STICC, France); Vianney Lapotre (Université de Bretagne Sud, France); Loic Lagadec (ENSTA-Bretagne & LABSTICC - UMR 6285, France)

DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark Amjad Alsirhani (Dalhousie University, Faculty of Computer Science & Canada, Canada); Srinivas Sampalli (Dalhousie University, Canada); Peter Bodorik (Dalhousie University, Faculty of Computer Science, Canada)

An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data

Deepthi Rao and D. V. N Siva Kumar (National Institute of Technology Karnataka Surathkal, India); Santhi Thilagam P. (National Institute of Technology Karnataka & Surathkal, India)

WSN2: WSN-ADT: WSN-ADT Workshop Section 2

Room D

Chair: Ioannis Papaefstathiou (Technical University of Crete & Synelixis Solutions Ltd., Greece)

On the Cramer-Rao Lower Bounds of Ranging Based on IR-UWB TOA Estimation in Wireless Body Area Networks

Page 6: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

Jihad Hamie (Telecom ParisTech, Paris, France); Ali Hamieh (Lebanese University, Faculty of Agriculture, Lebanon); Ali Hamie (Arts Sciences & Technology University in Lebanon (AUL), Lebanon); Ahmad Ahmad-Kassem (AUL, Lebanon); Ahmad Skaiky (Aul, Lebanon); Abbass Nasser (AUCE, Lebanon); Hani Abdallah (American University of Culture and Education, Lebanon); Joumana Younes (Iul, Lebanon); Moussa Ammar (Inkript Industies Holding, Lebanon)

Localization of Sensors in Indoor Wireless Networks: An Observation Model Using WiFi RSS

Daniel AlShamaa and Farah Mourad-Chehade (Université de Technologie de Troyes, France); Paul Honeine (Université de Rouen, France)

Modelling of S-MAC for Heterogeneous WSN Canek Portillo-Jimenez (Universitat Politècnica de València, Spain); Jorge Martinez-Bauset and Vicent Pla (Universitat Politecnica de Valencia, Spain)

Page 7: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

Tuesday, February 27

09:00 - 10:30

CID 1: CID Workshop Session 1

Room C

Chair: Farkhund Iqbal (Zayed University, United Arab Emirates)

Drone Forensics: Challenges and New Insights

Hana Bouafif and Faouzi Kamoun (ESPRIT, Tunisia); Farkhund Iqbal and Andrew Marrington (Zayed University, United Arab Emirates)

Remote Data Acquisition Using Raspberry Pi3 Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi and Farkhund Iqbal (Zayed University, United Arab Emirates); Djedjiga Mouheb (University of Sharjah, United Arab Emirates); Omar Alfandi (University of Goettingen & Zayed University, Germany)

IoT Forensics: Challenges For The IoA Era Aine MacDermott, Thar Baker and Qi Shi (Liverpool John Moores University, United Kingdom (Great Britain))

N4: Smart Homes and Smart Cities

Room A

Chair: Samir Ghamri-Doudane (Nokia Bell Labs, France)

Improving flexibility in Wireless Sensor Networks via API. An application in ambient monitoring

Manuel Jesús Espinosa-Gavira, MJEG (University of Cadiz & PAIDI-TIC-168 Reserach Group, Spain); Álvaro Jiménez-Pro, Juan José González de la Rosa, Agustin Agüera-Pérez and Olivia Florencias-Oliveros (University of Cadiz, Spain); Jose Carlos Palomares-Salas (University of Cadiz & Research Unit PAIDI-TIC-168, Spain); Jose Maria Sierra-Fernández (University of Cadiz & PAIDI-TIC-168 Reserach Group, Spain)

Wireless vital signal tracking for Drivers using micro-Doppler seatback radar

Dong Kyoo Kim (Electronics and Telecommunications Research Institute, Korea)

Demand Side Management in Smart grids: A STackelberg Multi period Multi Provider game Hala Al Salloum (Universite Libanaise & Universite De Technologie De Troyes, France); Leila Boulahia (University of Technology of Troyes, France); Rana Rahim (Lebanese University, Lebanon); Ali Elmasri (Universite Libanaise, Lebanon)

S4: Security and Usability

Room B

Chair: Mathew Nicho (Zayed University, United Arab Emirates)

Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models Giulia De Santis (INRIA - Nancy Grand Est, France); Abdelkader Lahmadi (LORIA, France); Jérôme François (INRIA Nancy Grand Est, France); Olivier Festor (INRIA Nancy - Grand Est, France)

Classification of unknown Web sites based on yearly changes of distribution information of malicious IP addresses

Yoshitaka Nakamura, Shihori Kanazawa, Hiroshi Inamura and Osamu Takahashi (Future University Hakodate, Japan)

"Speak, friend, and enter" - Secure, Spoken One-Time Password Authentication

Page 8: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

Outi-Marja Latvala, Cheng Yuan Peng and Petri Honkamaa (VTT Technical Research Centre of Finland ltd, Finland); Kimmo Halunen (VTT Technical Research Centre of Finland, Finland)

10:30 - 11:00

Coffee Break

11:00 - 12:30

CID 2: CID Workshop Session 2

Room C

Chair: Farkhund Iqbal (Zayed University, United Arab Emirates)

A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection Johan Garcia (Karlstad University, Sweden)

Malware Classification with Deep Convolutional Neural Networks Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil Bruce and Yang Wang (University of Manitoba, Canada); Farkhund Iqbal (Zayed University, United Arab Emirates)

The security and traceability of shared information in the process of transportation of dangerous goods

Adnan Imeri (Luxembourg Institute of Science and Technology & LIST, Luxembourg)

S5: Surveillance, Monitoring and Intrusion detection

Room A

Chairs: Takoua Abdellatif (Carthage University, Tunisia), Layth Sliman (EFREI- Paris, France)

Identifying Vulnerabilities in APT Attacks: A Simulated Approach Mathew Nicho (Zayed University, United Arab Emirates); Faouzi Kamoun (ESPRIT, Tunisia); Adelaiye Oluwasegun (Bingham University, Nigeria)

MapReduce approach to build network user profiles with top-k rankings for network security

Alvaro Parres-Peredo, Ivan Piza-Davila and Francisco Cervantes (ITESO - The Jesuit University of Guadalajara, Mexico)

On The Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework

Daniel Fraunholz, Daniel Krohmer and Frederic Pohl (German Research Center for Artificial Intelligence, Germany); Hans Dieter Schotten (Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, Germany)

S6: Security engineering: Methodologies, formalism, modeling, tools, code instrumentation

Room B

Chair: Abed Ellatif Samhat (Lebanese University, Lebanon)

A Trust by Design Framework for the Internet of Things Davide Ferraris, Carmen Fernandez-Gago and Javier Lopez (University of Malaga, Spain)

Multi-provider Secure Virtual Network Embedding François Boutigny (Telecom SudParis & Nokia Bell Labs, France); Stéphane Betgé-Brezetz (Nokia Bell Labs, France); Herve Debar (Télécom SudParis & Institut Mines-Télécom, France); Gregory Blanc (TELECOM SudParis, France); Ion Popescu (Telecom Sud Paris, France); Antoine Lavignotte (Telecom SudParis, France)

Page 9: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

Location Privacy in Virtual Cell-Equipped Ultra-Dense Networks Emanuele Catania and Aurelio La Corte (University of Catania, Italy)

12:30 - 14:00

Lunch

14:00 - 15:00

Keynote: Toward open smart IoT Systems: an overview of recent initiatives and future directions

Room A

Chair: Houda Labiod (TELECOM ParisTech (ex: ENST), France)

15:30 - 16:00

Coffee Break

16:00 - 18:00

Invited papers

Room C

Chair: Layth Sliman (EFREI- Paris, France)

BAD AI: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems

Sajjad Dadkhah and Mario Koeppen (Kyushu Institute of Technology, Japan); Somayeh Sadeghi (University Malaya, Japan); Kaori Yoshida, (Kyushu Institute of Technology, Japan)

Phone application for indoor localization based on BLE signal fingerprint Brahim Benaissa (kyushu Institute of technology, Japan); Filip Hendrichovsky (Technical University of Kosice, Slovakia); Kaori Yishida Mario Köppen (kyushu Institute of technology, Japan); Peter Sincák (Technical University of Kosice, Slovakia)

Chaff-points Generation Method Based on adaptive Genetic Algorithms and Non-fixed Size Squares Boundaries for Resource Constrained Devices

Hachemi Nabil (Dellys, ESI, Algeria); Layth Sliman (EFREI, France); Karima Benatchba (ESI, Algeria); Yen Wei Chen (Ritsumeikan University, Japan)

Inter-Application based resource management approach for Cloud infrastructure Mahesh Balaji (Cognizant Technology Solutions, India); Aswani Kumar Cherukuri (Vellore Institute of Technology, India)

Star projection technologies in the modern planetarium industry Alexander Adli (Ohira Tech, Japan)

M3: Analysis, Simulation and Performance Evaluation

Room A

Chair: Daniel Corujo (Instituto de Telecomunicações Aveiro & Universidade de Aveiro, Portugal)

An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs Raid Y. Zaghal, Mohammad Ismail and Saeed Salah (Al-Quds University, Palestine)

Direct Vehicle-to-Vehicle Charging strategy in Vehicular Ad-Hoc Networks Guangyu Li (Nanjing University of Science and Technology, P.R. China); Lila Boukhatem (Paris-Sud&LRI/CNRS, France); Lin Zhao (Nanjing University of Science and Technology, P.R. China); Jinsong Wu (Universidad de Chile, Chile)

Page 10: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

An Evaluation of UHF RFID Anti-Collision Protocols With NS2 Rahma Benfraj (University of Tunis, Tunisia); Vincent Beroulle (University of Grenoble Alpes, France); Nicolas Fourty (Grenoble INP - LCIS, France); Aref Meddeb (National School of Engineering, University of Sousse, Tunisia)

Performance Analysis of Mobile Cellular Networks with MMPP Call Arrival Patterns S. Lirio Castellanos-Lopez (UAM, Mexico); Felipe A. Cruz-Pérez (Cinvestav-IPN, Mexico); Genaro Hernandez-Valdez (UAM-A, Mexico)

S7: Cryptography, Privacy, Security and Usability

Room B

Chair: Stavros Shiaeles (Plymouth University, United Kingdom (Great Britain))

Horizontal Address-Bit DEMA against ECDSA Ievgen Kabin (IHP, Germany); Zoya Dyka (Innovations for High Performance Microelectronics & IHP, Germany); Dan Kreiser (IHP, Germany); Peter Langendoerfer (IHP Microelectronics, Germany)

An Authenticated Encrypted Compressive Sensing based Imaging Mechanism Tao Wu and Christoph Ruland (University of Siegen, Germany)

Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks

Juan E Rubio, Cristina Alcaraz Tello and Javier Lopez (University of Malaga, Spain)

Privacy Preserving Queries on Directed Graph Sara Ramezanian, Tommi Meskanen and Valtteri Niemi (University of Helsinki, Finland)

19:00 - 23:00

Banquet

Page 11: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

Wednesday, February 28

09:00 - 10:30

BSC1: Data Analytics & Cryptocurrency

Room B

Chair: Elyes Ben Hamida (IRT SystemX, France)

Quantitative Description of Internal Activity on the Ethereum Public Block Andra Anoaica (IRT SystemX, France); Hugo Levard (SQLI, France)

In-store payments using Bitcoin Mikael Asplund, Jakob Lövhall and Simin Nadjm-Tehrani (Linköping University, Sweden)

Small Transactions with Sustainable Incentives Fabio Pianese (Nokia Bell Labs, France); Matteo Signorini (Nokia Bell Labs Paris, France); Souradip Sarkar (Bell Labs @ Nokia, Belgium)

Tutorial: Applications of Blockchain to Supply Chain and Logistics: emerging trends and new challenges

10:30 - 11:00

Coffee Break

11:00 - 12:30

BSC2: Smart Contracts

Room B

Chair: Kalpana Singh (IRT SystemX & CEA, France)

Lessons Learned from Implementing a Privacy-Preserving Smart Contract in Ethereum Andreas Unterweger, Fabian Knirsch, Christoph Leixnering and Dominik Engel (Salzburg University of Applied Sciences, Austria)

Security Assurance for Smart Contract Ence Zhou, Song Hua, Bingfeng Pi and Jun Sun (Fujitsu Research & Development Center, P.R. China); Yashihide Nomura, Kazuhiro Yamashita and Hidetoshi Kurihara(Fujitsu Laboratories Ltd., Japan)

Formal verification of smart contracts based on users and blockchain behaviors models Tesnim Abdellatif (EDF, France); Kei-Léo Brousmiche (IRT SystemX, France)

Recycling Smart Contracts: Compression of the Ethereum Blockchain

Beltran Fiz Pontiveros (University of Luxembourg & Telindus Luxembourg, Luxembourg); Robert Norvill and Radu State (University of Luxembourg, Luxembourg)

Tutorial: Applications of Blockchain to Supply Chain and Logistics: emerging trends and new challenges

12:30 - 14:00

Lunch

Page 12: Time Room A Room B Room C - ntms-conf.org · CID Workshop S1 10:30 – 11:00 Coffee Break 11:00 – 12:30 Surveillance, Monitoring and Intrusion detection Security engineering: Methodologies,

14:00 - 15:30

BSC3: Architecture & Technologies

Room B

Chair: Nouha Omrane (Docapost, France)

Empowering Light Nodes in Blockchains with Block Summarization Asutosh Palai, Meet Vora and Aashaka Shah (Indian Institute of Technology Roorkee, India)

Smart-Contract based System Operations for Permissioned Blockchain Tatsuya Sato and Yosuke Himura (Hitachi, Ltd., Japan)

Evaluating Blockchains for IoT

Runchao Han (University of Manchester, United Kingdom (Great Britain)); Vincent Gramoli (University of Sydney & Data61-CSIRO, Australia); Xiwei Xu (Data61-CSIRO & UNSW, Australia)

AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of Things

Joshua Ellul and Gordon Pace (University of Malta, Malta)

15:30 - 16:00

Coffee Break

16:00 - 18:00

BSC4: Applications

Room B

Chair: Eric Thea (IRT SystemX, France)

Digitizing, Securing and Sharing Vehicles Life-cycle Over a Consortium Blockchain: Lessons Learned

Kei-Léo Brousmiche (IRT SystemX, France); Thomas Heno (PSA Group, France); Christian Poulain (PSA Goup, France); Antoine Dalmieres (Covea, France); Elyes Ben Hamida (IRT SystemX, France)

Efficient Distributed Admission and Revocation using Blockchain for Cooperative ITS Noureddine Lasla (Qatar Mobility Innovations Center (QMIC), Qatar); Mohamed Younis (University of Maryland Baltimore County, USA); Wassim Znaidi (Qatar University, France); Dhafer Ben Arbia (Qatar Mobility Innovations Center & SERCOM Lab, Polytechnic School of Tunisia, University of Carthage- Tunisia, Qatar)

A Blockchain Framework for Insurance Processes Mayank Raikwar (Nanyang Technological University, Singapore); Subhra Mazumdar (Indian Statistical Institute, India); Sushmita Ruj (Indian Statistical Institute, Kolkata, India); Sourav Sen Gupta (Indian Statistical Institute, India); Anupam Chattopadhyay and Kwok-Yan Lam (Nanyang Technological University, Singapore)

NFB: A Protocol for Notarizing Files over the Blockchain

Haikel Magrahi (Paris 8 University, France); Nouha Omrane and Olivier Senot (Docapost, France); Rakia Jaziri (Paris 8 University - LIASD - France, France)