[p2p-hackers] Call for Participation: The 12th Information Security Conference (ISC 2009)
Eros Pedrini
pedrini.pc at unimi.it
Tue Aug 18 08:17:32 PDT 2009
[Apologies if you receive multiple copies of this message]
CALL FOR PARTICIPATION
***********************************************************************
12th Information Security Conference (ISC 2009)
Pisa, Italy -- September 7-9, 2009
http://isc09.dti.unimi.it
***********************************************************************
ABOUT THE CONFERENCE
ISC is an annual international conference covering research in and
applications of information security. The twelfth Information
Security Conference (ISC 2009) will be held in Pisa, Italy. The
conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
information security.
The conference will be a 3-day event featuring technical
presentations of 29 full papers and 9 short papers and two invited talks.
The twelfth Information Security Conference (ISC 2009) will be held in
Pisa, Italy.
REGISTRATION
Registration information is available at
http://isc09.dti.unimi.it/registration
PROGRAM
* Monday, September 7, 2009
9:00 - 9:30 Opening
9:30 - 10:30 Keynote speaker: Prof. Sushil Jajodia
10:30 - 11:00 Coffee break
11:00 - 13:00 Session 1: Analysis techniques
A New Approach to chi^2 Cryptanalysis of Block Ciphers
Jorge Nakahara Jr, Gautham Sekar, Daniel Santana de Freitas,
Chang Chiann, Ramon Hugo de Souza, and Bart Preneel
Analysis and Optimization of Cryptographically Generated Addresses
Joppe W. Bos, Onur Ozen, and Jean-Pierre Hubaux
Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, and Dennis Kugler
Towards Security Notions for White-Box Cryptography (Short Paper)
Amitabh Saxena, Brecht Wyseur, and Bart Preneel
A calculus to detect guessing attacks (Short Paper)
Bogdan Groza and Marius Minea
13:00 - 14:15 Lunch
14:15 - 15:45 Session 2: Hash functions
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
Mario Lamberger and Florian Mendel
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Yu Sasaki
On Free-Start Collisions and Collisions for TIB3
Florian Mendel and Martin Schlaffer
15:45 - 16:15 Coffee break
16:15 - 17:45 Session 3: Database security and biometrics
Detection of Database Intrusion using a Two-Stage Fuzzy System
Suvasini Panigrahi, Shamik Sural
Combining Consistency and Confidentiality Requirements in
First-Order Databases
Joachim Biskup and Lena Wiese
Cancelable Iris Biometrics using Block Re-mapping and Image
Warping (Short Paper)
Jutta Hammerle-Uhl, Elias Pschernig, and Andreas Uhl
Iris Recognition in Nonideal Situations (Short Paper)
Kaushik Roy and Prabir Bhattacharya
* Tuesday, September 8, 2009
09:00 - 10:30 Session 4: Algebraic attacks and proxy re-encryption
Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext
Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, and Feng Bao
Practical Algebraic Attacks on the Hitag2 Stream Cipher
Nicolas T. Courtois, Sean ObNeil, and Jean-Jacques Quisquater
A New Construction of Boolean Functions with Maximum Algebraic
Immunity
Deshuai Dong, Shaojing Fu, Longjiang Qu, and Chao Li
10:30 - 11:00 Coffee break
11:00 - 13:00 Session 5: Distributed system security
A2M: Access-Assured Mobile Desktop Computing
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis,
and Jason Nieh
Automated Spyware Collection and Analysis
Andreas Stamminger, Christopher Kruegel, Giovanni Vigna,
and Engin Kirda
Towards Unifying Vulnerability Information for Attack Graph
Construction
Sebastian Roschke, Feng Cheng, Robert Schuppenies,
and Christoph Meinel
Traitor Tracing without a Priori Bound on the Coalition
Size (Short Paper)
Hongxia Jin and Serdar Pehlivanoglu
SISR - a New Model for Epidemic Spreading of Electronic
Threats (Short Paper)
Boris Rozenberg, Ehud Gudes, and Yuval Elovici
13:00 - 14:15 Lunch
14:15 - 15:45 Session 6: Identity management and authentication
An Efficient Distance Bounding RFID Authentication Protocol:
Balancing False-Acceptance Rate and Memory Requirement
Gildas Avoine and Aslan Tchamkerten
Robust Authentication Using Physically Unclonable Functions
Keith B. Frikken, Marina Blanton, and Mikhail J. Atallah
Risks of the CardSpace Protocol
Sebastian Gajek, Jorg Schwenk, Michael Steiner, and Chen Xuan
15:45 - 16:15 Coffee break
16:15 - 18:00 Session 7: Applied cryptography
Fair E-cash: Be Compact, Spend Faster
Sebastien Canard, Cecile Delerablee, Aline Gouget,
Emeline Hufschmitt, Fabien Laguillaumie, Herve Sibert,
Jacques Traore, and Damien Vergnaud
On the security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan
A Storage Efficient Redactable Signature in the Standard Model
Ryo Nojima, Jin Tamura, Youki Kadobayashi, and Hiroaki Kikuchi
Generic Construction of Stateful Identity Based Encryption
(Short Paper)
Peng Yang, Rui Zhang, Kanta Matsuura, and Hideki Imai
* Wednesday, September 9, 2009
09:30 - 10:30 Keynote speaker: Prof. Jan Camenisch
10:30 - 11:00 Coffee break
11:00 - 13:00 Session 8: Access control
Privacy-aware Attribute-based Encryption with User Accountability
Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan
Hardware-Assisted Application-Level Access Control
Yu-Yuan Chen and Ruby B. Lee
Towards Trustworthy Delegation in Role-Based Access Control Model
Manachai Toahchoodee, Xing Xie, and Indrakshi Ray
Secure Interoperation in Multidomain Environments Employing
UCON Policies (Short Paper)
Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu,
and Xiaopu Ma
Specification and Enforcement of Static Separation-of-Duty Policies
in Usage Control (Short Paper)
Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, and Xiaopu Ma
13:00 - 14:15 Lunch
14:15 - 15:45 Session 9: MAC and nonces
Nonce Generators and the Nonce Reset Problem
Erik Zenner
MAC Precomputation with Applications to Secure Memory
Juan Garay, Vladimir Kolesnikov, and Rae McLellan
HMAC without the bSecondb Key
Kan Yasuda
15:45 - 16:15 Coffee Break
16:15 - 17:45 Session 10: P2P and web services
Adding Trust to P2P Distribution of Paid Content
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis,
and Cliff Stein
Peer-to-peer Architecture for Collaborative Intrusion and Malware
Detection on a Large Scale
Mirco Marchetti, Michele Messori, and Michele Colajanni
F3ildCrypt: End-to-End Protection of Sensitive Information in
Web Services
Matthew Burnside and Angelos D. Keromytis
MORE INFORMATION
Additional information about the conference can be found at
http://isc09.dti.unimi.it/
_______________________________________________
p2p-hackers mailing list
p2p-hackers at lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
More information about the cypherpunks-legacy
mailing list