2009-08-18

[Tccc] Call for Participation: The 12th Information Security Conference (ISC 2009)

[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION

***********************************************************************
12th Information Security Conference (ISC 2009)
Pisa, Italy -- September 7-9, 2009
http://isc09.dti.unimi.it
***********************************************************************


ABOUT THE CONFERENCE

ISC is an annual international conference covering research in and
applications of information security. The twelfth Information
Security Conference (ISC 2009) will be held in Pisa, Italy. The
conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
information security.
The conference will be a 3-day event featuring technical
presentations of 29 full papers and 9 short papers and two invited talks.

The twelfth Information Security Conference (ISC 2009) will be held in
Pisa, Italy.


REGISTRATION

Registration information is available at
http://isc09.dti.unimi.it/registration


PROGRAM

* Monday, September 7, 2009

9:00 - 9:30 Opening

9:30 - 10:30 Keynote speaker: Prof. Sushil Jajodia

10:30 - 11:00 Coffee break

11:00 - 13:00 Session 1: Analysis techniques
A New Approach to chi^2 Cryptanalysis of Block Ciphers
Jorge Nakahara Jr, Gautham Sekar, Daniel Santana de Freitas,
Chang Chiann, Ramon Hugo de Souza, and Bart Preneel

Analysis and Optimization of Cryptographically Generated Addresses
Joppe W. Bos, Onur Ozen, and Jean-Pierre Hubaux

Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, and Dennis Kugler

Towards Security Notions for White-Box Cryptography (Short Paper)
Amitabh Saxena, Brecht Wyseur, and Bart Preneel

A calculus to detect guessing attacks (Short Paper)
Bogdan Groza and Marius Minea

13:00 - 14:15 Lunch

14:15 - 15:45 Session 2: Hash functions
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
Mario Lamberger and Florian Mendel

Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Yu Sasaki

On Free-Start Collisions and Collisions for TIB3
Florian Mendel and Martin Schlaffer

15:45 - 16:15 Coffee break

16:15 - 17:45 Session 3: Database security and biometrics
Detection of Database Intrusion using a Two-Stage Fuzzy System
Suvasini Panigrahi, Shamik Sural

Combining Consistency and Confidentiality Requirements in
First-Order Databases
Joachim Biskup and Lena Wiese

Cancelable Iris Biometrics using Block Re-mapping and Image
Warping (Short Paper)
Jutta Hammerle-Uhl, Elias Pschernig, and Andreas Uhl

Iris Recognition in Nonideal Situations (Short Paper)
Kaushik Roy and Prabir Bhattacharya


* Tuesday, September 8, 2009

09:00 - 10:30 Session 4: Algebraic attacks and proxy re-encryption

Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext
Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, and Feng Bao

Practical Algebraic Attacks on the Hitag2 Stream Cipher
Nicolas T. Courtois, Sean O'Neil, and Jean-Jacques Quisquater

A New Construction of Boolean Functions with Maximum Algebraic
Immunity
Deshuai Dong, Shaojing Fu, Longjiang Qu, and Chao Li

10:30 - 11:00 Coffee break

11:00 - 13:00 Session 5: Distributed system security

A2M: Access-Assured Mobile Desktop Computing
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis,
and Jason Nieh

Automated Spyware Collection and Analysis
Andreas Stamminger, Christopher Kruegel, Giovanni Vigna,
and Engin Kirda

Towards Unifying Vulnerability Information for Attack Graph
Construction
Sebastian Roschke, Feng Cheng, Robert Schuppenies,
and Christoph Meinel

Traitor Tracing without a Priori Bound on the Coalition
Size (Short Paper)
Hongxia Jin and Serdar Pehlivanoglu

SISR - a New Model for Epidemic Spreading of Electronic
Threats (Short Paper)
Boris Rozenberg, Ehud Gudes, and Yuval Elovici

13:00 - 14:15 Lunch

14:15 - 15:45 Session 6: Identity management and authentication

An Efficient Distance Bounding RFID Authentication Protocol:
Balancing False-Acceptance Rate and Memory Requirement
Gildas Avoine and Aslan Tchamkerten

Robust Authentication Using Physically Unclonable Functions
Keith B. Frikken, Marina Blanton, and Mikhail J. Atallah

Risks of the CardSpace Protocol
Sebastian Gajek, Jorg Schwenk, Michael Steiner, and Chen Xuan

15:45 - 16:15 Coffee break

16:15 - 18:00 Session 7: Applied cryptography

Fair E-cash: Be Compact, Spend Faster
Sebastien Canard, Cecile Delerablee, Aline Gouget,
Emeline Hufschmitt, Fabien Laguillaumie, Herve Sibert,
Jacques Traore, and Damien Vergnaud

On the security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan

A Storage Efficient Redactable Signature in the Standard Model
Ryo Nojima, Jin Tamura, Youki Kadobayashi, and Hiroaki Kikuchi

Generic Construction of Stateful Identity Based Encryption
(Short Paper)
Peng Yang, Rui Zhang, Kanta Matsuura, and Hideki Imai


* Wednesday, September 9, 2009

09:30 - 10:30 Keynote speaker: Prof. Jan Camenisch

10:30 - 11:00 Coffee break

11:00 - 13:00 Session 8: Access control

Privacy-aware Attribute-based Encryption with User Accountability
Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan

Hardware-Assisted Application-Level Access Control
Yu-Yuan Chen and Ruby B. Lee

Towards Trustworthy Delegation in Role-Based Access Control Model
Manachai Toahchoodee, Xing Xie, and Indrakshi Ray

Secure Interoperation in Multidomain Environments Employing
UCON Policies (Short Paper)
Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu,
and Xiaopu Ma

Specification and Enforcement of Static Separation-of-Duty Policies
in Usage Control (Short Paper)
Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, and Xiaopu Ma

13:00 - 14:15 Lunch

14:15 - 15:45 Session 9: MAC and nonces

Nonce Generators and the Nonce Reset Problem
Erik Zenner

MAC Precomputation with Applications to Secure Memory
Juan Garay, Vladimir Kolesnikov, and Rae McLellan

HMAC without the "Second" Key
Kan Yasuda

15:45 - 16:15 Coffee Break

16:15 - 17:45 Session 10: P2P and web services

Adding Trust to P2P Distribution of Paid Content
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis,
and Cliff Stein

Peer-to-peer Architecture for Collaborative Intrusion and Malware
Detection on a Large Scale
Mirco Marchetti, Michele Messori, and Michele Colajanni

F3ildCrypt: End-to-End Protection of Sensitive Information in
Web Services
Matthew Burnside and Angelos D. Keromytis

MORE INFORMATION

Additional information about the conference can be found at
http://isc09.dti.unimi.it/
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: