CETA 2011 Abstracts

Return to Workshop on Cryptography for Emerging Technologies and Applications page.

Primary Author

Co-Authors Title
Corella, Francisco
Karen Lewison, Pomcor An Overlooked Cryptographic Requirement for NSTIC
Desmedt, Yvo
University of College London
  Secret Sharing and Reliable Cloud Computing
Gligoroski, Danilo
Department of Telematics, NTNU, Norway
Svein Johan Knapskog, Q2S, NTNU, Norway
Simona Samardjiska, Department of Telematics, NTNU, Norway
The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies
Hoeper, Katrin
Motorola Solutions, Inc. 
Matthew Pirretti, Kevin Gudeth, Ron Buskey (Motorola Solutions, Inc) Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors
Janeja, Vandana
University of Maryland, Baltimore Campus (UMBC)
Nabil Adam, Rutgers University
Josephine Namayanja, UMBC
IntAleGen: Integrated Alert Generation in Multi Pronged attacks on Networked Systems
Keoh, Sye Loong
Philips Research Europe
Oscar Garcia-Morchon, Sandeep S. Kumar (Philips Research Europe) Key Security Challenges in Smart Swarm of Things (SSoT)
Kupwade-Patil, Harsh
Southern Methodist University
Joseph Camp, Stephen A. Szygenda (Southern Methodist University) Secure location and energy aware routing in Wireless Sensor Networks using Identity-based cryptography
Kutylowski, Miroslaw    Enabling Development of Applications for Smart Cards – Between Native Solutions and Javacards 
Lanzagorta, Marco
ITT Corporation
  Secure Submarine Communications
Maiti, Abhranil
Virginia Tech
Vikash Gunreddy, Patrick Schaumont (Virginia Tech) A Framework for the Evaluation of Physical Unclonable Functions
Mattsson, Ulf
Bart Preneel, Katholieke Universiteit Leuven A Novel Approach to the Tokenization of Credit Card Numbers
McAttee, Tuck
Revere Security
Whitfield Diffie, Daniel Engels (Revere Security) Revere Security Abstract for CETA
McGrew, David   Compact Asymmetric Authentication using Hash-based Signatures
McGrew, David   A Key Generation System (KGS) Suitable for Sensor and Building Networks
Mohan, Apurva
Honeywell ACS Labs  
  Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking
Moriyama, Daisuke
Shin'ichiro Matsuo, NICT   Security/Privacy Models for "Internet of things": What should be studied from RFID-schemes?
Parsons, Ron
TecSec, Inc.
  Implementing a Standards Based Dynamic Key Framework to Complement PKI
Reyzin, Leonid
Boston University
Kyle Brogle, Sharon Goldberg (Boston University) Aggregate Signatures for BGPsec 
Rundgren, Anders
PrimeKey Solutions
  End-To-End Secured Credentialing over the Internet
Struik, Rene
Struik Security Consultancy
  Portable Credentials
Struik, Rene
Struik Security Consultancy
  Cryptography for Highly Constrained Networks
Sturm, John
Indiana State University
  An Open Framework for Low-Latency Communications across the Smart Grid
Surber, Beth Ann
WV Secretary of State
Jackie Harris, WV Secretary of State Use of Cryptography in Securing On-line Voting
Tsai, Chii-ren
Citigroup O&T Risk Management
  Enterprise Key Management Challenges and Framework
Umezurike, Josiah J.    Symmetric Key Cryptography JJU-256 
Vijayarangan, Natarajan 
Tata Consultancy Services
  Trusted Mobile Education (Learning) Software
Volkovs, Nikolajs   A Novel Approach to Authentication
Zaverucha, Greg
Certicom Research
  ECQV Implicit Certificates and the Cryptographic Suite for Embedded Systems (Suite E)






Created October 12, 2011, Updated September 21, 2016