INCoS-FULL-1 | A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud Jingwei Li; Fu Jia; Jin Li; Zheli Liu |
INCoS-FULL-2 | Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption Changji Wang; Xuan Liu; Wentao Li |
INCoS-FULL-3 | A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud Shu Guo; Haixia Xu |
INCoS-FULL-4 | Improving Cloud Data Centre Scalability, Agility and Performance using Openflow Charlie Baker; Ashiq Anjum; Nik Bessis |
INCoS-FULL-5 | Independent Task Scheduling by Artificial Immune Systems, Differential Evolution, and Genetic Algorithms Pavel Kromer; Jan Platos; Vaclav Snasel |
INCoS-FULL-6 | Assistance to trainers for the observation and analysis activities of operators trainees on Nuclear Power Plant Full-Scope Simulator Olivier Champalle |
INCoS-FULL-7 | Learning the Classification of Traffic Accident Types Tibebe Tesema; Dejene Ejigu; Pavel Kromer; Jan Platos; Vaclav Snasel; Ajith Abraham |
INCoS-FULL-8 | Improving compression using words Jan Platos; Pavel Kromer |
INCoS-FULL-9 | DOA Estimation using Multiple Kernel Learning SVM Considering Mutual Coupling Mahdi Dehghanpour; Vahid TabaTaba Vakili; Ali Farrokhi |
INCoS-FULL-10 | Grid Configuration and Application Monitoring in GridGain Florin Pop; Alexandra Lovin; Catalin Negru; Valentin Cristea; Nik Bessis; Stelios Sotiriadis |
INCoS-FULL-11 | A Multi-Agent Matchmaker based on Hidden Markov Model for Decentralized Grid Scheduling Holman Bolテュvar Baron; Mario Martinez Rojas; Ruben Gonzalez Crespo; Oscar Sanjuan Martinez |
INCoS-FULL-12 | An advising system for supporting users of collaborative activities in LMSs Themistoklis Chronopoulos; Ioannis Hatzilygeroudis |
INCoS-FULL-13 | e-pedagogy as an alternative approach to digital literacy across the Curriculum for the gifted students Konstantinos Kalemis |
INCoS-FULL-14 | A Steady State Genetic Algorithm for Ground Stations Scheduling Problem Fatos Xhafa; Admir Barolli, Makoto Takizawa |
INCoS-FULL-15 | Orchestrating adaptive and complex CSCL scenarios through a choreography among IMS-LD and external services Ioannis Magnisalis; Stavros Demetriadis |
INCoS-FULL-16 | Optimizing the energy efficiency of message exchanging for service distribution in interoperable infrastructures Nik Bessis; Stelios Sotiriadis; Florin Pop; Valentin Cristea |
INCoS-FULL-17 | Internet of things as virtual settlements: Insights from excavating social media sites Demosthenes Akoumianakis; Nikolas Karadimitriou; George Vlachakis; Giannis Milolidakis; Nik Bessis |
INCoS-FULL-18 | Networking tactics for online eHealth campaigns and intervention studies: Preliminary results from a case study on nutritional support for cancer patients Patrizia Gnagnarella; Alessandro Misotti; Demosthenes Akoumianakis; Giannis Milolidakis |
INCoS-FULL-19 | Providing Security to Computer-Supported Collaborative Learning: An Overview Jorge Miguel; Santi Caball・ Josep Prieto |
INCoS-FULL-20 | Collection and Classification of Tennis Swings Using a Virtual Racket Kin Fun Li; Ana-Maria Sevcenco; Kosuke Takano |
INCoS-FULL-21 | Transmission Rate Control Utilizing Chaotic Nature of Coupled Oscillators Yuri Takahashi; Chisa Takano; Yusuke Sakumoto; Masaki Aida |
INCoS-FULL-22 | A Relational Approach to Collaborative Fairness Mario Koppen; Rodrigo Verschae; Masato Tsuru |
INCoS-FULL-23 | Using a Conversational Agent for Collaborative Language Learning Stergios Tegos; Stavros Demetriadis; Thrasivoulos Tsiatsos |
INCoS-FULL-24 | A Benchmark for Evaluating Approximated Algorithms for Fair Wireless Channel Allocation Rodrigo Verschae; Mario Koppen; Masato Tsuru |
INCoS-FULL-25 | HELGA: a Heterogenous Encoding Lifelike Genetic Algorithm for Population Evolution Modeling and Simulation Monica Patrascu; Alexandra Florentina Stancu; Adrian-Bogdan Hanchevici |
INCoS-FULL-26 | Evaluation for Acquiring Method for Agents' Actions with Ant Colony Optimization in RoboCup Rescue Simulation System Hisayuki Sasaoka |
INCoS-FULL-27 | Online Cooperative Behavior Planning using a Tree Search Method in the RoboCup Soccer Simulation Hidehisa Akiyama; Shigeto Aramaki; Tomoharu Nakashima |
INCoS-FULL-28 | An Improved Binary Authentication Tree Algorithm for Vehicular Networks Wang Huaqun; Bo Qin; Josep Domingo-Ferrer |
INCoS-FULL-29 | The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction Shen Yulong; Ning Xi; Qingqi Pei; Ma Jianfeng; Yudi Niu |
INCoS-FULL-30 | Securing vehicular networks using deterministic schemes for computing trust Mihaela Teler; Valentin Cristea |
INCoS-FULL-31 | A P2P Traffic Localization Method with Additional Delay Insertion Takumi Miyoshi; Yuki Shinozaki; Olivier Fourmaux |
INCoS-FULL-32 | A Non-delegatable Strong Designated Verifier Signature without Random Oracles Haibo Tian; Jiang Zhengtao; Liu Yi; Baodian Wei |
INCoS-FULL-33 | On the Security of An Enhanced ID-based Anonymous Proxy Signature Scheme in ICCAE2010 Jianhong Zhang |
INCoS-FULL-34 | Multi-party computation with social rational parties Yilei Wang |
INCoS-FULL-35 | Physical-layer Network Coding and Connected Dominating Set based Routing Protocol in Wireless Multi-hop Network Li Xu; Penggui Pan; Xiaoding Wang; Wei Wu |
INCoS-FULL-36 | DCCA-secure Public-Key Encryptions from Hybrid Paradigms Chen Yuan; Xiaofeng Chen; Hui Li |
INCoS-FULL-37 | Complementary Witness Soundness Witness Indistinguishable Proof system and CCA2 Public-Key Encryption Schemes Haixia Xu; Bao Li; Qixiang Mei |
INCoS-FULL-38 | A Trusted Authentication Scheme for Wireless Networks using Direct Anonymous Attestation Li Yang; Jian-feng Ma |
INCoS-FULL-39 | A strong designated verifier signature scheme with secure disavowability Bo Yang; Ying Sun; Yong Yu; Qi Xia |
INCoS-FULL-40 | Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks Yong Wang; Liu Yang; Yun Ai; Hui Li |
INCoS-FULL-41 | Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel Yong Wang; Aixiang Guo; Hong He; Hui Li |
INCoS-FULL-42 | The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm Ying Cai; Xiaofei Wang; Yuqing Zhang |
INCoS-FULL-43 | Toward Quantum-resistant Strong Designated Verifier Signature from Isogenies Xi Sun; Haibo Tian; Yumin Wang |
INCoS-FULL-44 | Cryptanalysis of an efficient three-party key exchange protocol Xiaotong Fu; Ruijun Shi |
INCoS-FULL-45 | Secure Similarity Coefficients Computation with Malicious Adversaries Bo Zhang; Fangguo Zhang |
INCoS-FULL-46 | Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data Momeng Liu |
INCoS-FULL-47 | An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings Xi Sun |
INCoS-FULL-48 | ESLRAS: a lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things Kai Fan; Jie Li; Hui Li; Xiaohui Liang; Sherman Shen; Yintang Yang |
INCoS-FULL-49 | Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model Limin Shen; Futai Zhang; Yinxia Sun; Sujuan Li |
INCoS-FULL-50 | A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption Sujuan Li; Futai Zhang; Yinxia Sun; Limin Shen |
INCoS-FULL-51 | Dynamic Group based Authentication Protocol for Machine Type Communications Yueyu Zhang; Hui Li; Jie Chen; Wujun Zhang; Jin Cao; Chengzhe Lai |
INCoS-FULL-52 | Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering Xudong Zhu; Hui Li |
INCoS-FULL-53 | End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture Wujun Zhang |
INCoS-FULL-54 | Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme Qi Xie; Guilin Wang; Fubiao Xia; Deren Chen |
INCoS-FULL-55 | ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage Jian Mao; Yan Zhang; Xiandong Xu; Tao Wei; Jianwei Liu |
INCoS-FULL-56 | A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing Hui Zhu; Wenhai Pan; Beishui Liu; Hui Li |
INCoS-FULL-57 | A self-calibration method based on two pairs of orthogonal parallel lines Lugang Zhao; Chengke Wu; Shigang Liu |
INCoS-FULL-58 | Deniably Information-hiding Encryptions Secure Against Adaptive Chosen Ciphertext Attack Chong-zhi Gao; Xie Dongqing; Jin Li; Baodian Wei |
INCoS-FULL-59 | A normalized local binary fitting model for image segmentation Yali Peng; Fang Liu; Licheng Jiao; Shigang Liu |
INCoS-FULL-60 | A Methodology for Ontology Evaluation using Topic Models Aryya Gangopadhyay; Matthew Molek; Yelena Yesha; Mary Brady; Yaacov Yesha |
INCoS-FULL-61 | Itiner@: Ontology for personalizing tourist routes in mobile devices Laia Descamps-Vila; Jordi Conesa; Antoni Perez-Navarro |
INCoS-FULL-62 | Problems in the implementation of routing algorithms of high complexity in mobile devices: the Itiner@ case Laia Descamps-Vila; Jordi Conesa; Antoni Perez-Navarro |
INCoS-FULL-63 | Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic Specialty Maria Elena Riu; David Baneres; Jordi Conesa |
INCoS-FULL-64 | Generic Methodology for Semantic DataWarehouse Design: From Schema Definition to ETL Berkani Nabila; Khouri Selma; Ladjel Bellatreche |
INCoS-FULL-65 | A Semantic Framework for Delivery of Context-Aware Ubiquitous Services in Pervasive Environments Alba Amato; Salvatore Venticinque; Beniamino Di Martino |
INCoS-FULL-66 | Performance Evaluation of Virtual Segment Method based on Actual Road Network Topology at the time of the Great East Japan Earthquake Yuta Kimura; Hiroshi Tsuji; Hiroyoshi Miwa |
INCoS-FULL-67 | Effect of Traffic Volume in Real-time Disaster Evacuation Guidance Using Opportunistic Communications Akihiro Fujihara; Hiroyoshi Miwa |
INCoS-FULL-68 | Neighbour Traffic-Aware Load Balancing Method in Ad Hoc Networks Ryo Yamamoto; Takumi Miyoshi; Yoshiaki Tanaka |
INCoS-FULL-69 | A Message Forward Scheduling Based on a Secretary Problem for Mobile Relay Nodes Takuya Tsuruike |
INCoS-FULL-70 | Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor Networks Phat Nguyen Huu; Vinh Tran-Quang; Takumi Miyoshi |
INCoS-FULL-71 | SOSCast: Location estimation of immobilized persons through SOS message propagation Noriyuki Suzuki; Jane Louie Zamora; Shigeru Kashihara; Suguru Yamaguchi |
INCoS-SHORT-1 | Secure Provable Data Possession for Object Storage System Zou Zhefeng |
INCoS-SHORT-2 | Comment an Anonymous Multi-receiver Identity-based Encryption Scheme Jianhong Zhang |
INCoS-SHORT-3 | On Cryptographic Properties of Boolean Functions by Concatenation Zepeng Zhuo; Jinfeng Chong |
INCoS-SHORT-4 | Modeling a Learner Based Semantic Web and Web Services Kheraif Nesrine |
INCoS-SHORT-5 | How can semantic be introduced in GIS mobile applications: expectations, theory and reality Laia Descamps-Vila; Jordi Conesa; Antoni Perez-Navarro |
INCoS-POSTER-1 | A composability Model for efficient Web services's connectivity Hajar Omrana; Fatima-Zahra Belouadha; Ounsa Roudies |
INCoS-POSTER-2 | Collaborative Systems for Building Automation Ioan Valentin Sita |
INCoS-POSTER-3 | Towards Programmatic Management of Services from Multiple Clouds Dana Petcu; Marc E. Frincu; Silviu Panica; Marian Neagul |
INCoS-POSTER-4 | Management of Software Driven Networks - Research Challenges Alex Galis; Stuart Clayman |
INCoS-POSTER-5 | Opengate on OpenFlow: System Outline Mitsuhiro Suenaga; Makoto Otani; Hisaharu Tanaka; Kenzi Watanabe |
INCoS-POSTER-6 | End-to-end Header Compression over Software-Defined Networks: a Low Latency Network Architecture Supalerk Jivorasetkul; Masayoshi Shimamura; Katsuyoshi Iida |
INCoS-POSTER-7 | Tertiary qualities for Affective engineering Michele Sinico |
INCoS-POSTER-8 | Rule based expert systems over cloud Traian-Lucian Militaru; George Suciu; Gyorgy Todoran; Anisia Florescu; Vlad Poenaru; Laurentiu Nae; Cristian Cernat |
CIDM-1 | Optimizing Task Allocation on Fire Fighting Frank-Gerrit Poggenpohl, Dennis Guttinger |
CIDM-2 | Interconnectedness of complex systems of Internet of Things through social network analysis for Disaster Management Asta Zelenkauskaite, Nik Bessis, Stelios Sotiriadis, Eleana Asimakopoulou |
CIDM-3 | Disaster Management and Profile Modelling of IoT Objects: Conceptual Parameters for Interlinked Objects in Relation to Social Network Analysis Asta Zelenkauskaite, Nik Bessis, Stelios Sotiriadis, Eleana Asimakopoulou |
CIDM-4 | Context based Access Control in Pervasive Environments Alexandru Petculescu |
FINCoS-1 | Building Control, Monitoring, Safety and Security using Ioan Valentin Sita |
FINCoS-2 | Integration between Psp and PmbokR Applied to the Development of an Expert System to Automatically Diagnose and Identify Professional Problems Oscar Franco, Luis Castillo, Francisco Garcia and Claudia Ramirez |
FINCoS-3 | Social Capital in Virtual Organizations Saad Alqithami |
FINCoS-4 | "Untraceability" Analysis of Two ID-based Proxy Blind Signature from Bilinear Pairings Hua Chen |
FINCoS-5 | ITIL frameworks to ITD Company for improving capabilities in service management Phuc Nguyen |
FINCoS-6 | Constructing Designated-verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption Xiaotong Fu, Wen Liu |
FINCoS-7 | A practical metadata model for access control modules Alexandru Petculescu |
FINCoS-8 | Mobile Based Intelligent System for Maximize Agricultural Yield Using Image Processing Prasad Shinde, Kaivalya Deshpande, Sagar Bhatewara and Ravi Gidwani |
FINCoS-9 | Boom Boom Boom! Towards a "Smarter" Mobile Learning Application Rui Neves Madeira |
FINCoS-10 | The Spiral-in Method for Designing and Connecting Learning Objects Evgenios Vlachos |
FINCoS-11 | Internet based education as an alternative way in adult education for ethnic immigrants Konstantinos Kalemis |
FINCoS-12 | Challenges in Adult Education and Lifelong Learning: Can ITS be an alternative way to achieve educational aims? Konstantinos Kalemis |
C3WN-1 | Energy-Aware Joint Power and Rate Control in Overlay Cognitive Radio Networks: A Nash Bargaining Perspective Chungang Yang, Jiandong Li |
C3WN-2 | Network-Coding-Based Hybrid-ARQ for Two-Way Relaying Xiaoye Shi, Jianhua Ge, Jing Li, Yancheng Ji |
C3WN-3 | Novel Distributed Turbo Coding Scheme in Two-Hop Relay Networks Defeng Ren, Jianhua Ge, Jing Li, Xiaoye Shi |
C3WN-4 | Interference Alignment with Complex FDPM-Based Subspace Tracking in MIMO Cognitive Networks Bin Zhu, Jianhua Ge, Jing Li, Yunxia Huang |
C3WN-5 | A Leakage-Based Precoding Scheme for Cognitive Multiuser MIMO Systems Chuiqiang Sun, Jianhua Ge, Jing Li, Xinxin Bao |
C3WN-6 | A Coordinated Mechanism for Multimode User Equipment Accessing Wireless Sensor Network Jun Xia, Rui Yun, Kai Yu, Fei Yin, Haifeng Wang, Zhiyong Bu |
C3WN-7 | Cooperative Transmission with Broadcasting and Communication Dongdong Wei, Lei Deng, Yun Rui, Mingqi Li, Fang Wang |
C3WN-8 | Outage-optimal power allocation for Space-time Cooperative Network Coding with Amplify-and-Forward Yancheng Ji, Guoan Zhang, Xiaoge Zhang, Xun Huang |
C3WN-9 | Impartial Spectrum Decision under Interference Temperature Model in Cognitive Wireless Mesh Networks Yun Yang, Guo-an Zhang, Yan-cheng Ji |
C3WN-10 | Game-theoretic resource allocation of the cognitive base station in two-tie co-existing femtocell networks Jing Song, Jianhua Ge, Jing Li |
LSNS-1 | Key Recovery Attack on a Knapsack Public Key Cryptosystem Chunfei Ju and Hui Yuan |
LSNS-2 | Lattice Attack on the Knapsack Cipher 0/255 Baocang Wang and Hao Lei |
LSNS-3 | Identity-based Proxy Signature for Cloud Service in SaaS Xi Cao, Li Xu and Wei Wu |
LSNS-4 | On the Security of A Multi-use CCA-secure Proxy Re-encryption Scheme Jindan Zhang and Xu An Wang |
LSNS-5 | Security Analysis of a Multi-use Identity Based CCA-secure Proxy Re-encryption Scheme Jindan Zhang and Xu An Wang |
LSNS-6 | Further Cryptanalysis of a Signature Scheme with Message Recovery Lei Niu and Yong Yu |
LSNS-7 | Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing Xu Ma, Jin Li and Fangguo Zhang |
LSNS-8 | An Identity based Signcryption Scheme in the Standard Model Bo Qin, Wang Huaqun, Qianhong Wu, Jianwei Liu and Josep Domingo-Ferrer |
MC2-1 | A Comparative Study Between Spatio-Temporal Orthogonal Moments for Volumes Description Manel Boutaleb, Imen Lassoued and Ezzeddine Zagrouba |
MC2-2 | Adaptive and Robust Step Detection with Mobile Devices Michael McGuire |
MC2-3 | Virtual Drums Based on Natural Interaction Jacob Wilschrey, Cristian Rusu, Ivan Mercado |
MC2-4 | Biomechanical Validation of Upper-body and Lower-body Joint Movements of
Kinect Motion Capture Data for Rehabilitation Treatments Adso Fernandez-Baena, Antonio Susin, Xavier Lligadas |
SIoT-1 | Inference Detection and Database Security for a Business Environment Traian Popeea, Anca Constantinescu, Laura Gheorghe, Nicolae Tapus |
SIoT-2 | A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services Sergiu Costea, Gabriel Ghinita, Dumitru Marian Barbu, Razvan Rughinis |
SIoT-3 | Optimized Directional Content Distribution using Reputation Andreea Urzica, Mircea Bardac |
SIoT-4 | Securing Virtual Networks for Multi-Owner Wireless Sensor Networks Laura Gheorghe, Dan Stefan Tudose, Markus Wehner, Sven Zeisberg |
SIoT-5 | A Self-healing Dynamic Key Management Scheme For Wireless Sensor Networks Based on EBS Jianting Ning, Xinchun Yin |
SIoT-6 | Adaptive Security Framework for Wireless Sensor Networks Laura Gheorghe, Razvan Rughinis, Nicolae Tapus |