2010-06-14

[Tccc] ESORICS 2010 - call for participation

[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION

registration now open!!!! (early bird deadline July 1)

***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************

ABOUT THE CONFERENCE

ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing together
researchers in this area, by promoting the exchange of ideas with system
developers and by encouraging links with researchers in related areas.

Progressively organized in a series of European countries, the symposium
is confirmed as the European research event in computer security.

The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance


REGISTRATION

Registration information is available at:
https://www.triaenatours.gr/esorics.php

Early registration fees apply, from now until July 1.


LIST OF ACCEPTED PAPERS
(listed alphabetically)

- Privacy-Preserving, Taxable Bank Accounts
(Androulaki, Elli; Vo, Binh; Bellovin, Steven)

- Speaker Recognition in Encrypted Voice Streams
(Backes, Michael; Koepf, Boris; Duermuth, Markus; Doychev, Goran)

- Efficient Multi-Dimensional Key Management in Broadcast Services
(Blanton, Marina; Frikken, Keith)

- Kamouflage: Loss-Resistant Password Management
(Bojinov, Hristo; Boneh, Dan; Bursztein, Elie; Boyen, Xavier)

- Traffic Analysis Against Low-Latency Anonymity Networks Using
Available Bandwidth Estimation
(Chakravarty, Sambuddho; Keromytis, Angelos D.; Stavrou, Angelos)

- Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information
(Christin, Nicolas; Chuang, John; Johnson, Benjamin;
Grossklags, Jens)

- RatFish: A File Sharing Protocol Provably Secure
Against Rational Users
(Ciobotaru, Oana-Madalina; Backes, Michael; Krohmer, Anton)

- Modeling and Analyzing Security in the Presence of
Compromising Adversaries
(Cremers, Cas; Basin, David)

- Formal Analysis of Privacy for Vehicular Mix-Zones
(Dahl, Morten; Delaune, Stephanie; Steel, Graham)

- Verifying Security Property of Peer-to-Peer Systems Using CSP
(Dinh, Tien Tuan Anh; Ryan, Mark)

- Enforcing Secure Object Initialization in Java
(Hubert, Laurent; Monfort, Vincent; Pichardie, David;
Jensen, Thomas)

- An Authorization Framework Resilient to Policy Evaluation Failures
(Huth, Michael; Crampton, Jason)

- Web Browser History Detection as a Real-World Privacy Threat
(Janc, Artur; Olejnik, Lukasz)

- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
(Kapravelos, Alexandros; Markatos, Evangelos P.; Polakis, Iasonas;
Ioannidis, Sotiris; Athanasopoulos, Elias)

- Low-Cost Client Puzzles based on Modular Exponentiation
(Karame, Ghassan; Capkun, Srdjan)

- A Comprehensive Approach for Cost-Sensitive Intrusion Response
(Kheir, Nizar; Cuppens, Nora; Cuppens, Frederic; Debar, Herve)

- Election Verifiability in Electronic Voting Protocols
(Kremer, Steve; Smyth, Ben; Ryan, Mark)

- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge
based on S-Protocols
(Krenn, Stephan; Barbosa, Manuel; Schneider, Thomas;
Bangerter, Endre; Sadeghi, Ahmad-Reza; Almeida, Jose Bacelar)

- Optimistic Fair Exchange with Multiple Arbiters
(Kupcu, Alptekin; Lysyanskaya, Anna)

- A New Framework for RFID Privacy
(Li, Yingjiu; Zhao, Yunlei; Yung, Moti; Deng, Robert)

- A Theory of Runtime Enforcement, with Results
(Ligatti, Jay; Reddy, Srikar)

- On E-Vote Integrity in the Case of Malicious Voter Computers
(Lipmaa, Helger; Van Laenen, Filip; Heiberg, Sven)

- Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model
(Liu, Joseph; Au, Man Ho; Susilo, Willy; Zhou, Jianying)

- Website Fingerprinting And Identification Using Ordered
Feature Sequences
(Lu, Liming; Chang, Ee-Chien; Chan, Mun Choon)

- On the Secrecy of Spread-Spectrum Flow Watermarks
(Luo, Xiapu; Zhang, Junjie; Lee, Wenke)

- Sequential Protocol Composition in Maude-NPA
(Meadows, Catherine; Meseguer, Jose; Escobar, Santiago;
Santiago, Sonia)

- Caught in the Maze of Security Standards
(Meier, Jan; Gollmann, Dieter)

- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
(Octavian, Catrina; de Hoogh, Sebastiaan)

- Evaluating Adversarial Partitions
(Pashalidis, Andreas; Schiffner, Stefan)

- Proving Mobile Users' Anonymity in Hybrid Networks
(Ardagna, Claudio; Jajodia, Sushil; Samarati, Pierangela
Stavrou, Angelos)

- Flexible Scheduler-Independent Security
(Sudbrock, Henning; Mantel, Heiko)

- Pretty Good Democracy for More Expressive Voting Schemes
(Teague, Vanessa; Ryan, Peter Y.A.; Heather, James)

- Complexity of Anonymity for Security Protocols
(Tiplea, Ferucio Laurentiu; Vamanu, Loredana; Varlan, Cosmin)

- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS
(Tokhtabayev, Arnur; Skormin, Victor; Dolgikh, Andrey)

- Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
(Uzun, Ersin; Nithyanand, Rishab; Tsudik, Gene)

- k-Zero Day Safety: Measuring the Security Risk of Networks against
Unknown Attacks
(Wang, Lingyu; Jajodia, Sushil; Singhal, Anoop; Noel, Steven)

- A Hierarchical Adaptive Probabilistic Approach for Zero Hour
Phish Detection
(Xiang, Guang; Rose, Carolyn; Hong, Jason; Pendleton, Bryan)

- DR@FT: Efficient Remote Attestation Framework for Dynamics Systems
(Xu, Wenjuan; Ahn, Gail-Joon; Hu, Hongxin; Zhang, Xinwen;
Seifert, Jean-Pierre)

- On Bounding Problems of Quantitative Information Flow
(Yasuoka, Hirotoshi; Terauchi, Tachio)

- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time
(Zhang, Chao; Zou, Wei; Wei, Tao; Wang, Tielei; Cheng, Yu)


MORE INFORMATION

Additional information about the conference can be found at:
www.esorics2010.org
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: