Submit a Paper

Propose a Workshop

Propose a Mini Symposium

The Eighth International Conference on Emerging Security Information, Systems and Technologies

SECURWARE 2014

November 16 - 20, 2014 - Lisbon, Portugal


Awards

The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.

Awarded Papers

The Policy-Based AS_PATH Verification to Monitor AS Path Hijacking
Je-Kuk Yun, Beomseok Hong, Yanggon Kim

N-Gram-Based User Behavioral Model for Continuous User Authentication
Leslie Milton, Bryan Robbins, Atif Memon

Saving Privacy in Trust-Based User-Centric Distributed Systems
Alessandro Aldini

Performance Impacts in Database Privacy-Preserving Biometric Authentication
Jana Dittmann, Veit Köppen, Christian Krätzer, Martin Leuckert, Gunter Saake, Claus Vielhauer

A Backtracking Symbolic Execution Engine with Sound Path Merging
Andreas Ibing

Ghost Map: Proving Software Correctness using Games
Ronald Watro, Kerry Moffitt, Talib Hussain, Daniel Wyschogrod, John Ostwald, Derrick Kong, Clint Bowers, Eric Church, Joshua Guttman, Qinsi Wang

 

The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.

Papers Invited for IARIA Journals

Security of Vehicular Networks: Static and Dynamic Control of Cyber-Physical Objects
Vladimir Muliukha, Vladimir Zaborovsky, Sergey Popov

Enhancing Privacy on Identity Providers
Rafael Weingärtner, Carla Merkle Westphall

Adding Secure Deletion to an Encrypted File System on Android Smartphones
Alexandre Braga, Alfredo Colito

Linearity Measures for Multivariate Public Key Cryptography
Simona Samardjiska, Danilo Gligoroski

Managed Certificate Whitelisting - A Basis for Internet of Things Security in Industrial Automation Applications
Rainer Falk, Steffen Fries

Challenges for Evolving Large-Scale Security Architectures
Geir Køien

Attack Surface Reduction for Web Services based on Authorization Patterns
Roland Steinegger, Johannes Schäfer, Max Vogler, Sebastian Abeck

Evaluation of Vehicle Diagnostics Security – Implementation of a Reproducible Security Access
Martin Ring, Tobias Rensen, Reiner Kriesten

 

The following papers have been selected on the basis of their contents and topic fitness to sensor networks. Authors of these papers are receiving invitationd tosubmit extended article versions to IFSA.

Papers Invited to IFSA

Data Quality and Security Evaluation Tool for Nanoscale Sensors
Leon Reznik, Sergey Edward Lyshevski

 
 

Copyright (c) 2006-2014, IARIA