Information Security News mailing list archives
2001 IEEE Symposium on Security and Privacy
From: InfoSec News <isn () C4I ORG>
Date: Mon, 26 Feb 2001 18:28:46 -0600
http://www.ieee-security.org/TC/sp2001.html May 13-16, 2001 The Claremont Resort Oakland, California, USA sponsored by IEEE Computer Society Technical Committee on Security and Privacy in cooperation with The International Association for Cryptologic Research (IACR) Sunday, 13 May 2001 4:00- 7:00 Registration and Reception Monday, 14 May 2001 - Wednesday, 16 May 2001: Conference Proper The conference program has not yet been finalized. Below is a list of accepted paper, in no particular order. List of Accepted Papers Evaluation of Intrusion Detectors: A Decision Theory Approach John Gaffney, Jacob Ulvila Performance of Public Key-Enabled Kerberos Authentication in Large Networks Alan Harbitter, Daniel A. Menasce Cryptographic Security for Mobile Code Joy Algesheimer, Christian Cachin, Jan Camenisch, Gnter Karjoth Intrusion Detection via Static Analysis David Wagner, Drew Dean On Confidentiality and Algorithms Johan Agat A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission Birgit Pfitzmann, Michael Waidner Protection of Keys against Modification Attack Wai-wa FUNG, Mordecai Golin, Jim Gray Cryptographic Key Generation from Voice Authors: Fabian Monrose, Michael Reiter, Qi Li, Susanne Wetzel Information-Theoretic Measures for Anomaly Detection Wenke Lee, Dong Xiang Preserving Information Flow Properties under Refinement Heiko Mantel A Trend Analysis of Exploitations Hilary Browne, William Arbaugh, John McHugh, William Fithen Understanding Trust Management Systems Stephen Weeks Data Mining Methods for Detection of New Malicious Executables Matthew Schultz, Eleazar Eskin, Erez Zadok, Sal Stolfo SD3: A trust management system with certified evaluation Trevor Jim A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors R Sekar, Mugdha Bendre, Pradeep Bollineni Formal Treatment of Certificate Revocation Under Communal Access Control Xuhui Ao, Naftaly Minsky, Victoria Ungureanu Networked Cryptographic Devices Resilient to Capture Philip MacKenzie, Michael Reiter Graph-Based Authentication of Digital Streams Sara Miner, Jessica Staddon ELK, a New Protocol for Efficient Large-Group Key Distribution Adrian Perrig, Dawn Song, J. D. Tygar ---------------------------------------------------------------------- 5-Minute Talks A continuing feature of the symposium will be a session of 5-minute talks, where attendees can present preliminary research results or summaries of works published elsewhere. Printed abstracts of these talks will be distributed at the symposium. Abstracts for 5-minute talks should fit on one 8.5"x11" or A4 page, including the title and all author names and affiliations. Send an email with a MIME attachment containing your abstract in PDF or portable postscript format to needham () microsoft com. This email should state that your abstract is for the session of 5-minute presentations at the 2001 IEEE Symposium on Security and Privacy, and should include the presenter's name, email and postal addresses, and phone and fax numbers. Please use a subject field containing the string "Oakland01". 5-minute abstracts due: March 12, 2001 Acceptance notification: April 2, 2001 ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- 2001 IEEE Symposium on Security and Privacy InfoSec News (Feb 26)