[Apologies if you receive multiple copies of this message] CALL FOR PARTICIPATION *********************************************************************** 12th Information Security Conference (ISC 2009) Pisa, Italy -- September 7-9, 2009 http://isc09.dti.unimi.it *********************************************************************** ABOUT THE CONFERENCE ISC is an annual international conference covering research in and applications of information security. The twelfth Information Security Conference (ISC 2009) will be held in Pisa, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of information security. The conference will be a 3-day event featuring technical presentations of 29 full papers and 9 short papers and two invited talks. The twelfth Information Security Conference (ISC 2009) will be held in Pisa, Italy. REGISTRATION Registration information is available at http://isc09.dti.unimi.it/registration PROGRAM * Monday, September 7, 2009 9:00 - 9:30 Opening 9:30 - 10:30 Keynote speaker: Prof. Sushil Jajodia 10:30 - 11:00 Coffee break 11:00 - 13:00 Session 1: Analysis techniques A New Approach to chi^2 Cryptanalysis of Block Ciphers Jorge Nakahara Jr, Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, and Bart Preneel Analysis and Optimization of Cryptographically Generated Addresses Joppe W. Bos, Onur Ozen, and Jean-Pierre Hubaux Security Analysis of the PACE Key-Agreement Protocol Jens Bender, Marc Fischlin, and Dennis Kugler Towards Security Notions for White-Box Cryptography (Short Paper) Amitabh Saxena, Brecht Wyseur, and Bart Preneel A calculus to detect guessing attacks (Short Paper) Bogdan Groza and Marius Minea 13:00 - 14:15 Lunch 14:15 - 15:45 Session 2: Hash functions Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n Mario Lamberger and Florian Mendel Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL Yu Sasaki On Free-Start Collisions and Collisions for TIB3 Florian Mendel and Martin Schlaffer 15:45 - 16:15 Coffee break 16:15 - 17:45 Session 3: Database security and biometrics Detection of Database Intrusion using a Two-Stage Fuzzy System Suvasini Panigrahi, Shamik Sural Combining Consistency and Confidentiality Requirements in First-Order Databases Joachim Biskup and Lena Wiese Cancelable Iris Biometrics using Block Re-mapping and Image Warping (Short Paper) Jutta Hammerle-Uhl, Elias Pschernig, and Andreas Uhl Iris Recognition in Nonideal Situations (Short Paper) Kaushik Roy and Prabir Bhattacharya * Tuesday, September 8, 2009 09:00 - 10:30 Session 4: Algebraic attacks and proxy re-encryption Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, and Feng Bao Practical Algebraic Attacks on the Hitag2 Stream Cipher Nicolas T. Courtois, Sean ObNeil, and Jean-Jacques Quisquater A New Construction of Boolean Functions with Maximum Algebraic Immunity Deshuai Dong, Shaojing Fu, Longjiang Qu, and Chao Li 10:30 - 11:00 Coffee break 11:00 - 13:00 Session 5: Distributed system security A2M: Access-Assured Mobile Desktop Computing Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, and Jason Nieh Automated Spyware Collection and Analysis Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, and Engin Kirda Towards Unifying Vulnerability Information for Attack Graph Construction Sebastian Roschke, Feng Cheng, Robert Schuppenies, and Christoph Meinel Traitor Tracing without a Priori Bound on the Coalition Size (Short Paper) Hongxia Jin and Serdar Pehlivanoglu SISR - a New Model for Epidemic Spreading of Electronic Threats (Short Paper) Boris Rozenberg, Ehud Gudes, and Yuval Elovici 13:00 - 14:15 Lunch 14:15 - 15:45 Session 6: Identity management and authentication An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement Gildas Avoine and Aslan Tchamkerten Robust Authentication Using Physically Unclonable Functions Keith B. Frikken, Marina Blanton, and Mikhail J. Atallah Risks of the CardSpace Protocol Sebastian Gajek, Jorg Schwenk, Michael Steiner, and Chen Xuan 15:45 - 16:15 Coffee break 16:15 - 18:00 Session 7: Applied cryptography Fair E-cash: Be Compact, Spend Faster Sebastien Canard, Cecile Delerablee, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Herve Sibert, Jacques Traore, and Damien Vergnaud On the security of Identity Based Ring Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan A Storage Efficient Redactable Signature in the Standard Model Ryo Nojima, Jin Tamura, Youki Kadobayashi, and Hiroaki Kikuchi Generic Construction of Stateful Identity Based Encryption (Short Paper) Peng Yang, Rui Zhang, Kanta Matsuura, and Hideki Imai * Wednesday, September 9, 2009 09:30 - 10:30 Keynote speaker: Prof. Jan Camenisch 10:30 - 11:00 Coffee break 11:00 - 13:00 Session 8: Access control Privacy-aware Attribute-based Encryption with User Accountability Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan Hardware-Assisted Application-Level Access Control Yu-Yuan Chen and Ruby B. Lee Towards Trustworthy Delegation in Role-Based Access Control Model Manachai Toahchoodee, Xing Xie, and Indrakshi Ray Secure Interoperation in Multidomain Environments Employing UCON Policies (Short Paper) Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, and Xiaopu Ma Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control (Short Paper) Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, and Xiaopu Ma 13:00 - 14:15 Lunch 14:15 - 15:45 Session 9: MAC and nonces Nonce Generators and the Nonce Reset Problem Erik Zenner MAC Precomputation with Applications to Secure Memory Juan Garay, Vladimir Kolesnikov, and Rae McLellan HMAC without the b Secondb Key Kan Yasuda 15:45 - 16:15 Coffee Break 16:15 - 17:45 Session 10: P2P and web services Adding Trust to P2P Distribution of Paid Content Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, and Cliff Stein Peer-to-peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale Mirco Marchetti, Michele Messori, and Michele Colajanni F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Matthew Burnside and Angelos D. Keromytis MORE INFORMATION Additional information about the conference can be found at http://isc09.dti.unimi.it/ _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE