[Om-announce] ISC 2011 - Call for Participation
sara.foresti at unimi.it
sara.foresti at unimi.it
Sat Aug 20 16:45:45 CEST 2011
[Apologies if you receive multiple copies of this message]
CALL FOR PARTICIPATION
**********************************************************************
14th Information Security Conference (ISC 2011)
Xi'an, China -- 26-29 October, 2011
http://ste.xidian.edu.cn/isc2011/
**********************************************************************
ABOUT THE CONFERENCE
The 14th Information Security Conference (ISC 2011) will be held in
Xi'an, China. It will be sponsored by China Computer Federation
(CCF) and co-organized by Xidian University. The conference website
is http://ste.xidian.edu.cn/isc2011/. The Information Security
Conference (ISC) is an annual international conference covering
research in theory and applications of Information Security.
The conference will be a 3-day event featuring technical
presentations of 25 technical papers.
It also includes two keynote speeches.
REGISTRATION
Registration information is available at
http://ste.xidian.edu.cn/isc2011/regist.html
Early registration fees apply until 15 September, 2011.
PROGRAM
Wednesday, 26 October 2011
--------------------------
16:00 - 20:00 Registration on Site
18:30 - 21:00 Welcome Reception
======================================================================
Thursday, 27 October 2011
-------------------------
09:00 - 09:30 Opening/Photo
09:30 - 10:30 Keynote 1: Feng Bao [Session Chair: Xuejia Lai]
10:30 - 11:00 Coffee Break
11:00 - 12:30 ATTACKS
- Replacement Attacks on Behavior Based Software Birthmark
(Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu,
Bing Mao, and Li Xie)
- Attacking Traitor Tracing Schemes using History Recording
and Abrupt Decoders
(Aggelos Kiayias and Serdar Pehlivanoglu)
- How to Find Short RC4 Colliding Key Pairs
(Jiageng Chen and Atsuko Miyaji)
12:30 - 14:00 Lunch
14:00 - 15:30 PROTOCOLS
- A Formal Approach to Distance-Bounding RFID Protocols
(Cristina Onete, Marc Fischlin, Michael Kasper, and
Ulrich Duerholz)
- MASHA - Low Cost Authentication with a New Stream Cipher
(Shinsaku Kiyomoto, Matt Henricksen, Wun-She Yap,
Yuto Nakano, and Kazuhide Fukushima)
- Certificateless Authenticated Key Agreement Protocol
without Bilinear Pairings
(Hu Xiong, Qianhong Wu, and Zhong Chen)
15:30 - 16:00 Coffee Break
16:00 - 17:30 PUBLIC-KEY CRYPTOSYSTEMS
- Security Analysis of an RSA Key Generation Algorithm with
a Large Private Key
(Fanyu Kong, Jia Yu, and Lei Wu)
- Adaptive Secure-Channel Free Public-Key Encryption with
Keyword Search Implies Timed Release Encryption
(Keita Emura, Atsuko Miyaji, and Kazumasa Omote)
- The n-Diffie-Hellman Problem and its Applications
(Liqun Chen and Yu Chen)
======================================================================
Friday, 28 October 2011
-----------------------
09:00 - 10:00 NETWORK SECURITY
- RatBot: Anti-Enumeration Peer-to-Peer Botnets
(Guanhua Yan, Songqing Chen, and Stephan Eidenbenz)
- Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
(Ge Zhang and Simone Fischer-Huebner)
10:00 - 11:00 SOFTWARE SECURITY
- Multi-Stage Binary Code Obfuscation Using Improved Virtual Machine
(Hui Fang, Yong Dong Wu, Shuhong Wang, and Yin Huang)
- Detection and Analysis of Cryptographic Data inside Software
(Ruoxu Zhao, Dawu Gu, Juanru Li, and Ran Yu)
11:00 - 11:30 Coffee Break
11:30 - 12:30 Keynote 2: Dieter Gollmann [Session Chair: Jianying Zhou]
12:30 - 14:00 Lunch
14:00 - 15:30 SYSTEM SECURITY
- SudoWeb: Minimizing Information Disclosure to Third Parties in
Single Sign-On Platforms
(Georgios Kontaxis, Michalis Polychronakis, and Evangelos Markatos)
- Hello RootKitty: A Lightweight Invariance-Enforcing Framework
(Francesco Gadaleta, Nick Nikiforakis, Yves Younan,
and Wouter Joosen)
- Opacity Analysis in Trust Management Systems
(Moritz Y. Becker and Masoud Koleini)
15:30 - 16:00 Coffee Break
16:00 - 17:30 DATABASE SECURITY
- On the Inference-Proofness of Database Fragmentation
Satisfying Confidentiality Constraints
(Joachim Biskup, Marcel Preuss, and Lena Wiese)
- Round-Efficient Oblivious Database Manipulation
(Bingsheng Zhang, Sven Laur, and Jan Willemson)
- A Privacy-Preserving Join on Outsourced Database
(Sha Ma, Bo Yang, Kangshun Li, and Feng Xia)
18:30 - 21:00 Conference Dinner/Best Paper Awards
======================================================================
Saturday, 29 October 2011
-------------------------
09:00 - 10:30 PRIVACY
- APPA: Aggregate Privacy-Preserving Authentication in
Vehicular Ad Hoc Networks
(Lei Zhang, Qianhong Wu, Bo Qin, and Josep Domingo-Ferrer)
- Assessing Location Privacy in Mobile Communication Networks
(Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle,
and Dirk von Suchodoletz. )
- How Much is Enough? Choosing epsilon for Differential Privacy
(Jaewoo Lee and Chris Clifton)
10:30 - 11:00 Coffee Break
11:00 - 12:30 DIGITAL SIGNATURES
- Non-interactive CDH-Based Multisignature Scheme in the
Plain Public Key Model with Tighter Security
(Yuan Zhou, Haifeng Qian, and Xiangxue Li)
- An Efficient Construction of Time-Selective Convertible
Undeniable Signature
(Qiong Huang, Duncan S. Wong, Willy Susilo, and Bo Yang)
- Efficient Fail-Stop Signatures from the Factoring Assumption
(Atefeh Mashatan and Khaled Ouafi)
12:30 - 13:30 Lunch
13:30 - 18:00 Tour to Terra-Cotta Warrior and Horses Museum
MORE INFORMATION
Additional information about the conference can be found at
http://ste.xidian.edu.cn/isc2011/
More information about the Om-announce
mailing list