[PET] ISC 2011 - Call for Participation

sara.foresti at unimi.it sara.foresti at unimi.it
Sat Aug 20 15:59:06 BST 2011


[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION 

**********************************************************************
14th Information Security Conference (ISC 2011)
Xi'an, China -- 26-29 October, 2011
http://ste.xidian.edu.cn/isc2011/
**********************************************************************

ABOUT THE CONFERENCE

The 14th Information Security Conference (ISC 2011) will be held in
Xi'an, China. It will be sponsored by China Computer Federation
(CCF) and co-organized by Xidian University. The conference website
is http://ste.xidian.edu.cn/isc2011/. The Information Security
Conference (ISC) is an annual international conference covering
research in theory and applications of Information Security.
The conference will be a 3-day event featuring technical 
presentations of 25 technical papers. 
It also includes two keynote speeches.


REGISTRATION

Registration information is available at
http://ste.xidian.edu.cn/isc2011/regist.html

Early registration fees apply until 15 September, 2011.


PROGRAM

Wednesday, 26 October 2011 
--------------------------

16:00 - 20:00 Registration on Site

18:30 - 21:00 Welcome Reception 

======================================================================

Thursday, 27 October 2011
-------------------------

09:00 - 09:30 Opening/Photo

09:30 - 10:30 Keynote 1: Feng Bao [Session Chair: Xuejia Lai]

10:30 - 11:00 Coffee Break

11:00 - 12:30 ATTACKS

- Replacement Attacks on Behavior Based Software Birthmark
  (Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, 
   Bing Mao, and Li Xie)

- Attacking Traitor Tracing Schemes using History Recording 
  and Abrupt Decoders
  (Aggelos Kiayias and Serdar Pehlivanoglu)

- How to Find Short RC4 Colliding Key Pairs
  (Jiageng Chen and Atsuko Miyaji)

12:30 - 14:00 Lunch

14:00 - 15:30 PROTOCOLS

- A Formal Approach to Distance-Bounding RFID Protocols
  (Cristina Onete, Marc Fischlin, Michael Kasper, and 
   Ulrich Duerholz)

- MASHA - Low Cost Authentication with a New Stream Cipher
  (Shinsaku Kiyomoto, Matt Henricksen, Wun-She Yap, 
   Yuto Nakano, and Kazuhide Fukushima)

- Certificateless Authenticated Key Agreement Protocol 
  without Bilinear Pairings
  (Hu Xiong, Qianhong Wu, and Zhong Chen)

15:30 - 16:00 Coffee Break

16:00 - 17:30 PUBLIC-KEY CRYPTOSYSTEMS 	

- Security Analysis of an RSA Key Generation Algorithm with 
  a Large Private Key
  (Fanyu Kong, Jia Yu, and Lei Wu)

- Adaptive Secure-Channel Free Public-Key Encryption with 
  Keyword Search Implies Timed Release Encryption
  (Keita Emura, Atsuko Miyaji, and Kazumasa Omote)

- The n-Diffie-Hellman Problem and its Applications
  (Liqun Chen and Yu Chen)

======================================================================

Friday, 28 October 2011
-----------------------

09:00 - 10:00 NETWORK SECURITY    	

- RatBot: Anti-Enumeration Peer-to-Peer Botnets
  (Guanhua Yan, Songqing Chen, and Stephan Eidenbenz)

- Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
  (Ge Zhang and Simone Fischer-Huebner)

10:00 - 11:00 SOFTWARE SECURITY	

- Multi-Stage Binary Code Obfuscation Using Improved Virtual Machine
  (Hui Fang, Yong Dong Wu, Shuhong Wang, and Yin Huang)

- Detection and Analysis of Cryptographic Data inside Software
  (Ruoxu Zhao, Dawu Gu, Juanru Li, and Ran Yu)

11:00 - 11:30 Coffee Break

11:30 - 12:30 Keynote 2: Dieter Gollmann [Session Chair: Jianying Zhou]

12:30 - 14:00 Lunch

14:00 - 15:30 SYSTEM SECURITY

- SudoWeb: Minimizing Information Disclosure to Third Parties in 
  Single Sign-On Platforms
  (Georgios Kontaxis, Michalis Polychronakis, and Evangelos Markatos)

- Hello RootKitty: A Lightweight Invariance-Enforcing Framework
  (Francesco Gadaleta, Nick Nikiforakis, Yves Younan, 
   and Wouter Joosen)

- Opacity Analysis in Trust Management Systems
  (Moritz Y. Becker and Masoud Koleini)

15:30 - 16:00 Coffee Break

16:00 - 17:30 DATABASE SECURITY   	

- On the Inference-Proofness of Database Fragmentation 
  Satisfying Confidentiality Constraints
  (Joachim Biskup, Marcel Preuss, and Lena Wiese)

- Round-Efficient Oblivious Database Manipulation
  (Bingsheng Zhang, Sven Laur, and Jan Willemson)

- A Privacy-Preserving Join on Outsourced Database
  (Sha Ma, Bo Yang, Kangshun Li, and Feng Xia)

18:30 - 21:00 Conference Dinner/Best Paper Awards 

======================================================================

Saturday, 29 October 2011
-------------------------

09:00 - 10:30 PRIVACY   	

- APPA: Aggregate Privacy-Preserving Authentication in 
  Vehicular Ad Hoc Networks
  (Lei Zhang, Qianhong Wu, Bo Qin, and Josep Domingo-Ferrer)

- Assessing Location Privacy in Mobile Communication Networks
  (Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, 
   and Dirk von Suchodoletz. )

- How Much is Enough? Choosing epsilon for Differential Privacy
  (Jaewoo Lee and Chris Clifton)

10:30 - 11:00 Coffee Break

11:00 - 12:30 DIGITAL SIGNATURES

- Non-interactive CDH-Based Multisignature Scheme in the 
  Plain Public Key Model with Tighter Security
  (Yuan Zhou, Haifeng Qian, and Xiangxue Li)

- An Efficient Construction of Time-Selective Convertible 
  Undeniable Signature
  (Qiong Huang, Duncan S. Wong, Willy Susilo, and Bo Yang)

- Efficient Fail-Stop Signatures from the Factoring Assumption
  (Atefeh Mashatan and Khaled Ouafi)

12:30 - 13:30 Lunch

13:30 - 18:00 Tour to Terra-Cotta Warrior and Horses Museum 



MORE INFORMATION

Additional information about the conference can be found at
http://ste.xidian.edu.cn/isc2011/


More information about the PET mailing list