[p2p-hackers] Call for Participation: The 12th Information Security Conference (ISC 2009)

Eros Pedrini pedrini.pc at unimi.it
Tue Aug 18 08:17:32 PDT 2009


[Apologies if you receive multiple copies of this message]

                          CALL FOR PARTICIPATION

***********************************************************************
             12th Information Security Conference (ISC 2009)
                   Pisa, Italy -- September 7-9, 2009
                       http://isc09.dti.unimi.it
***********************************************************************


ABOUT THE CONFERENCE

ISC is an annual international conference covering research in and
applications of information security. The twelfth Information
Security Conference (ISC 2009) will be held in Pisa, Italy.  The
conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
information security.
The conference will be a 3-day event featuring technical
presentations of 29 full papers and 9 short papers and two invited talks.

The twelfth Information Security Conference (ISC 2009) will be held in
Pisa, Italy.


REGISTRATION

Registration information is available at
http://isc09.dti.unimi.it/registration


PROGRAM

* Monday, September 7, 2009

9:00 - 9:30 Opening

9:30 - 10:30 Keynote speaker: Prof. Sushil Jajodia

10:30 - 11:00 Coffee break

11:00 - 13:00 Session 1: Analysis techniques
   A New Approach to chi^2 Cryptanalysis of Block Ciphers
     Jorge Nakahara Jr, Gautham Sekar, Daniel Santana de Freitas,
     Chang Chiann, Ramon Hugo de Souza, and Bart Preneel

   Analysis and Optimization of Cryptographically Generated Addresses
     Joppe W. Bos, Onur Ozen, and Jean-Pierre Hubaux

   Security Analysis of the PACE Key-Agreement Protocol
     Jens Bender, Marc Fischlin, and Dennis Kugler

   Towards Security Notions for White-Box Cryptography (Short Paper)
     Amitabh Saxena, Brecht Wyseur, and Bart Preneel

   A calculus to detect guessing attacks (Short Paper)
     Bogdan Groza and Marius Minea

13:00 - 14:15 Lunch

14:15 - 15:45 Session 2: Hash functions
   Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
     Mario Lamberger and Florian Mendel

   Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
     Yu Sasaki

   On Free-Start Collisions and Collisions for TIB3
     Florian Mendel and Martin Schlaffer

15:45 - 16:15 Coffee break

16:15 - 17:45 Session 3: Database security and biometrics
   Detection of Database Intrusion using a Two-Stage Fuzzy System
     Suvasini Panigrahi, Shamik Sural

   Combining Consistency and Confidentiality Requirements in
   First-Order Databases
     Joachim Biskup and Lena Wiese

   Cancelable Iris Biometrics using Block Re-mapping and Image
   Warping (Short Paper)
     Jutta Hammerle-Uhl, Elias Pschernig, and Andreas Uhl

   Iris Recognition in Nonideal Situations (Short Paper)
     Kaushik Roy and Prabir Bhattacharya


* Tuesday, September 8, 2009

09:00 - 10:30 Session 4: Algebraic attacks and proxy re-encryption

   Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext
   Security
     Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, and Feng Bao

   Practical Algebraic Attacks on the Hitag2 Stream Cipher
     Nicolas T. Courtois, Sean ObNeil, and Jean-Jacques Quisquater

   A New Construction of Boolean Functions with Maximum Algebraic
   Immunity
     Deshuai Dong, Shaojing Fu, Longjiang Qu, and Chao Li

10:30 - 11:00 Coffee break

11:00 - 13:00 Session 5: Distributed system security

   A2M: Access-Assured Mobile Desktop Computing
     Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis,
     and Jason Nieh

   Automated Spyware Collection and Analysis
     Andreas Stamminger, Christopher Kruegel, Giovanni Vigna,
     and Engin Kirda

   Towards Unifying Vulnerability Information for Attack Graph
   Construction
     Sebastian Roschke, Feng Cheng, Robert Schuppenies,
     and Christoph Meinel

   Traitor Tracing without a Priori Bound on the Coalition
   Size (Short Paper)
     Hongxia Jin and Serdar Pehlivanoglu

   SISR - a New Model for Epidemic Spreading of Electronic
   Threats (Short Paper)
     Boris Rozenberg, Ehud Gudes, and Yuval Elovici

13:00 - 14:15 Lunch

14:15 - 15:45 Session 6: Identity management and authentication

   An Efficient Distance Bounding RFID Authentication Protocol:
   Balancing False-Acceptance Rate and Memory Requirement
     Gildas Avoine and Aslan Tchamkerten

   Robust Authentication Using Physically Unclonable Functions
     Keith B. Frikken, Marina Blanton, and Mikhail J. Atallah

   Risks of the CardSpace Protocol
     Sebastian Gajek, Jorg Schwenk, Michael Steiner, and Chen Xuan

15:45 - 16:15 Coffee break

16:15 - 18:00 Session 7: Applied cryptography

   Fair E-cash: Be Compact, Spend Faster
     Sebastien Canard, Cecile Delerablee, Aline Gouget,
     Emeline Hufschmitt, Fabien Laguillaumie, Herve Sibert,
     Jacques Traore, and Damien Vergnaud

   On the security of Identity Based Ring Signcryption Schemes
     S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan

   A Storage Efficient Redactable Signature in the Standard Model
     Ryo Nojima, Jin Tamura, Youki Kadobayashi, and Hiroaki Kikuchi

   Generic Construction of Stateful Identity Based Encryption
   (Short Paper)
     Peng Yang, Rui Zhang, Kanta Matsuura, and Hideki Imai


* Wednesday, September 9, 2009

09:30 - 10:30 Keynote speaker: Prof. Jan Camenisch

10:30 - 11:00 Coffee break

11:00 - 13:00 Session 8: Access control

   Privacy-aware Attribute-based Encryption with User Accountability
     Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan

   Hardware-Assisted Application-Level Access Control
     Yu-Yuan Chen and Ruby B. Lee

   Towards Trustworthy Delegation in Role-Based Access Control Model
     Manachai Toahchoodee, Xing Xie, and Indrakshi Ray

   Secure Interoperation in Multidomain Environments Employing
   UCON Policies (Short Paper)
     Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu,
     and Xiaopu Ma

   Specification and Enforcement of Static Separation-of-Duty Policies
   in Usage Control (Short Paper)
     Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, and Xiaopu Ma

13:00 - 14:15 Lunch

14:15 - 15:45 Session 9: MAC and nonces

   Nonce Generators and the Nonce Reset Problem
     Erik Zenner

   MAC Precomputation with Applications to Secure Memory
     Juan Garay, Vladimir Kolesnikov, and Rae McLellan

   HMAC without the bSecondb Key
     Kan Yasuda

15:45 - 16:15 Coffee Break

16:15 - 17:45 Session 10: P2P and web services

   Adding Trust to P2P Distribution of Paid Content
     Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis,
     and Cliff Stein

   Peer-to-peer Architecture for Collaborative Intrusion and Malware
   Detection on a Large Scale
     Mirco Marchetti, Michele Messori, and Michele Colajanni

   F3ildCrypt: End-to-End Protection of Sensitive Information in
   Web Services
     Matthew Burnside and Angelos D. Keromytis



MORE INFORMATION

Additional information about the conference can be found at
http://isc09.dti.unimi.it/



_______________________________________________
p2p-hackers mailing list
p2p-hackers at lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list