Find the full program of the ARES 2016 here.
To find all details about each session, you can either click in the overview below on the session you are interested in or scroll down.
ARES Conference | ARES EU Symposium | Plenary Sessions | Workshops | CD-ARES Conference | Social Events |
WEDNESDAY, August 31, 2016 | ||||||||
---|---|---|---|---|---|---|---|---|
LH C | LH D | LH E | LH F | LH G | LH A | LH B | ||
08:00 – 18:00 | Registration | |||||||
09:00 – 09:15 | Opening, LH A | |||||||
09:15 – 10:15 | Keynote, LH A Koen Hermans, EUROJUST, The European Union’s Judicial Cooperation Unit, The Netherlands International Judicial Cooperation in the Fight against Cybercrime |
|||||||
10:00 – 10:30 | Short Coffee Break | |||||||
10:30 – 12:00 | SECODIC I | SECPID I | SOCOTUD I | FASES I | E-CRIME I | 10:30 – 12:00 | ARES Full I – Best Paper Session, LH A | |
12:00 – 13:00 | Lunch – Poster Session & Get2Gether | |||||||
13:00 – 14:00 | SECODIC II | SECPID II | SOCOTUD II | FASES II | E-CRIME II | 13:00 – 14:30 | ARES Full II | CD-ARES I |
14:00 – 14:30 | Coffee Break | 14:30 – 15:00 | Coffee Break | |||||
14:30 – 15:15 | ARES EU Symposium Keynote LH H Thomas C. Stubbings, TS Management Consulting eU, Austria Cyber-Legislation, Standardisation and Pan-European Cooperation as strategic drivers to strengthen Cybersecurity across Europe |
15:00 – 16:30 | ARES Full III | CD-ARES II | ||||
15:15 – 16:45 | SECODIC III | SENCEC I | RESIST I | FASES III | MUININ I | |||
16:30 – 17:00 | Coffee Break | |||||||
16:45 – 17:00 | Break – Poster Session & Get2Gether | |||||||
17:00 – 18:00 | SECODIC IV | RESIST II | MUININ II | 17:00 – 18:00 | ARES Full IV | CD-ARES III | ||
18:00 – 22:00 | Welcome Reception |
Wednesday, August 31, 2016 | |
---|---|
08:00 – 18:00 | Registration desk open |
09:00 – 09:15 | Plenary Session |
Opening | |
09:15 – 10:15 | Plenary Session |
Keynote
Koen Hermanns, EUROJUST, The European Union’s Judicial Cooperation Unit |
|
10:15 – 10:30 | short Coffee Break |
10:30 – 12:00 | Parallel Sessions |
SECODIC I – Private and Secure Data Storage in the Cloud I
1. “Empowering privacy and security in non-trusted environments”: a WITDOM overview (presentation only) SECPID I – Security and Privacy in the Cloud I 1. PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services SOCOTUD I – Talks and discussions on recent trends in user involvement and social collaboration 1. Workshop Introduction FASES I – Data Protection, Privacy Preservation and Discrimination Discovery 1. From discrimination discovery to preventing algorithmic bias (Invited Talk) E-CRIME I – The economic impacts of cyber crime I 1. E-CRIME: Is measuring cyber crime elusive ? (presentation only) |
|
12:00 – 13:00 | Lunch – Poster Session & Get2Gether |
13:00 – 14:00 | Parallel Sessions |
SECODIC II – Private and Secure Data Storage in the Cloud II
1. Data Sharing in the cloud with Proxy-Re-Encryption and Malleable Signature (presentation only) SECPID II – Security and Privacy in the Cloud II 1. Cryptographically Enforced Four-Eyes Principle SOCOTUD II – Demonstration, talks, and discussion on social collaboration in software development 1. Geographic Localization of an Anonymous Social Network Message Data Set FASES II – Economic value of Personal Information 1.The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads E-CRIME II – The economic impacts of cyber crime II 1. E-CRIME: Opportunities for effective countermeasures to fight cyber crime (presentation only) |
|
14:00 – 14:30 | Coffee Break |
14:30 – 15:15 | Plenary Session |
ARES EU Symposium Keynote
Thomas C. Stubbings, Thomas Stubbings Management Consulting eU, Austria |
|
15:15 – 16:45 | Parallel Sessions |
SECODIC III – Private and Secure Processing in the Cloud
1. Challenges for Isolating Computational Resources in Cloud Software Stacks (presentation only) SENCEC I – Strengthening Cooperation of European Network Centres of Excellence in Cybercrime 1. Possibilities for Synergies: SENTER project (presentation only) RESIST I 1. Risk Assessment for Socio-technical Security Models (presentation only) FASES III – Novel methods for authentication, identification and certificates issuance 1.Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licencing Capabilities MUININ I 1. Introduction (project overview and current status): |
|
16:45 – 17:00 | Coffee Break |
17:00 – 18:00 | Parallel Sessions |
SECODIC IV – Integrity and Verifiability of Outsourced Data/Computation
1. Verifiable Polynomial Evaluation & Matrix Multiplication (presentation only) RESIST II 1. The TREsPASS Attack Navigator including Demonstration (presentation only) MUININ II 1. Advanced Image and Text Analysis: Project Progress: |
|
18:00 – 22:00 | Welcome Reception |