Educause Security Discussion mailing list archives
Call for participation ICICS 2010. December 15-17, 2010
From: Juan Hernández Serrano <jserrano () ENTEL UPC EDU>
Date: Thu, 28 Oct 2010 14:54:49 +0200
** Apologies for multiple copies ** -------------------------------------------------------------------- -------------------------------------------------------------------- ICICS 2010 Twelfth International Conference on Information and Communications Security http://www.icics2010.org icics2010 () entel upc edu Barcelona, Spain 15-17 December, 2010 CALL FOR PARTICIPATION -------------------------------------------------------------------- -------------------------------------------------------------------- Information and communication security must provide technological solutions to the tension between the accelerating growth of social, economical and governmental demand for digitalization of information on the one hand, and on the other, the legal and ethical obligation to protect the individuals and organizations involved. The 2010 International Conference on Information and Communications Security (ICICS 2010) will be the 12th event in the ICICS conference series, started in 1997, which brought together lead researchers and engineers involved in multiple disciplines of information and communications security, to foster the exchange of ideas in aspects including, but not limited to, authentication and authorization, distributed and mobile systems security, e-commerce, fraud control, intellectual property protection, operating system security, anonymity and privacy, and trusted computing. In response to the call for papers, 135 submissions were received to this year’s installment of the conference series. Each paper received at least three peerreviews on the basis of its significance, novelty, technical quality and relevance to this event. The highly competitive selection process could accept only 31 papers, subject to a final revision before publication. -------------------------------------------------------------------- Registration -------------------------------------------------------------------- Registration (http://www.icics2010.org/registration) is open and includes: 1. A copy of the conference proceedings 2. Admission to all conference sessions 3. Lunch and mid-conference refreshments 4. Social event and conference banquet ICICS 2010 will be held at the Catalonia Barcelona Plaza hotel. This imposing hotel is situated in Plaza España, next to the Fira de Barcelona facilities and Montjuïc. Guests can enjoy excellent connections with every means of public transport. More information can be found at http://www.icics2010.org/venue It is advisable to make a hotel reservation as soon as possible. More details can be found at http://www.icics2010.org/accommodation -------------------------------------------------------------------- Invited Talks -------------------------------------------------------------------- Title: Information-theoretic and combinatorial approaches to steganography Speaker: Grigori Kabatiansky Dobrushin Mathematical Laboratory, Institute of Information Transmission Problems, Russian Academy of Sciences, Russia Title: Validating Digital Signatures as non-repudiation Evidence Speaker: Jianying Zhou Institute for Infocomm Research, Singapore Title: Cryptographic hash functions: theory and practice Speaker: Bart Preneel Dept. Elektrotechniek-ESAT /COSIC, Katholieke Universiteit Leuven, Belgium -------------------------------------------------------------------- Conference Program -------------------------------------------------------------------- For a more in detail conference progran please visit us at http://www.icics2010.org/program Session 1A: Access control "Rewriting of SPARQL/Update Queries for Securing Data access" Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Stephane Morucci "Fine-Grained Disclosure of Access Policies" Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio Session 1B. Public key cryptography and cryptanalysis "Manger’s Attack revisited" Falko Strenzke "Horizontal Correlation Analysis on Exponentiation" Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil "Threshold Public-key Encryption with Adaptive Security and Short Ciphertexts" Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer Session 1C. Security in distributed and mobile systems "A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks" Jaydip Sen "CUDACS: Securing the Cloud with CUDA-enabled Secure Virtualization" Flavio Lombardi, Roberto Di Pietro "SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms" Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez "A Fast and Secure Passport-Visa Authentication Scheme for Wireless Communications" Talal Alharbi, Abdullah Almuhaideb, Phu Dung Le "Compromise-Resilient Anti-Jamming for Wireless Sensor Networks" Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao Session 1D. Cryptanalysis "On Practical Second-Order Power Analysis Attacks" Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro Trifiletti "Consecutive S-box Lookups: A Timing Attack on SNOW 3G" Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio Session 2A. Authentication "Efficient Authentication for Mobile and Pervasive Computing" Basel Alomair, Radha Poovendran "Security Enhancement and Modular Treatment Towards Authenticated Key Exchange" Jiaxin Pan, Libin Wang, Changshe Ma "Federated Secret Handshakes with Support for Revocation" Alessandro Sorniotti, Refik Molva Session 2B. Fair exchange protocols "An Agent-Mediated Fair Exchange Protocol" Gerard Draper Gil, Jianying Zhou, Josep LLu´ıs Ferrer-Gomila "A New Method for Formalizing Optimistic Fair Exchange Protocols" Ming Chen, Kaigui Wu, Jie Xu, Pan He "Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme" Mehrdad Nojoumian, Douglas R. Stinson Session 2C. Anonymity and privacy "Proving Coercion-Resistance of Scantegrity II" Ralf Küsters, Tomasz Truderung, Andreas Vogt "Anonymity and Verifiability in Voting: Understanding (Un)Linkability" Lucie Langer, Hugo Jonker, Wolter Pieters "A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms" Kurt Dietrich, Johannes Winter "TimeWarp: how time affects privacy in LBSs.Threats and countermeasures" Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti Session 2D. Software security "Return-oriented Rootkit without Returns (on the x86)" Ping Chen, Xiao Xing, Bing Mao, Li Xie "Experimental threat model reuse with misuse case diagrams" Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland "Automatically Generating Patch in Binary Programs Using Attribute-based Taint Analysis" Kai Chen, Yifeng Lian, Yingjun Zhang Session 3A. Proxy cryptosystems "Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities" Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto "Ciphertext Policy Attribute-based Proxy Re-encryption" Song Luo, Jianbin Hu, Zhong Chen Session 3B. Intrusion detection systems "Hybrid detection of application layer attacks using Markov models for normality and attacks" Rolando Salazar-Hernández, Jesús E. Díaz-Verdejo "A Trust-based IDS for the AODV Protocol" Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent "IDS Alert Visualization and Monitoring through Heuristic Host Selection" Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani "A Two-tier System for Web Attack Detection Using Linear Discriminant Method" Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia, Wei-chang Yeh -------------------------------------------------------------------- Conference Committee -------------------------------------------------------------------- General Chair: Javier López University of Málaga, Spain Program Co-Chairs: Sihan Qing Peking University, China Miguel Soriano Universitat Politècnica de Catalunya, Spain Publication Chair: Juan Hernández-Serrano Universitat Politècnica de Catalunya, Spain Program Committee Members: Mikhail Atallah Purdue University, USA Alex Biryukov University of Luxembourg, Luxembourg Frederic Cuppens Telecom Bretagne, France Jesus Díaz-Verdejo University of Granada, Spain Josep Domingo-Ferrer Universitat Rovira i Virgili, Catalonia Óscar Esparza Universitat Politècnica de Catalunya, Spain Praveen Gauravaram Technical University of Denmark, Denmark Antonio F. Gómez-Skarmeta University of Murcia, Spain Juan González-Nieto Queensland University of Technology, Australia Yong Guan Iowa State University, USA James Heather University of Surrey, UK Juan Hernández-Serrano Universitat Politècnica de Catalunya, Spain Chi-Sung Laih National Cheng Kung University, Taiwan Yingjiu Li Singapore Management University,Singapore Wenbo Mao EMC, USA Chris Mitchell University of London, United Kingdom Eiji Okamoto University of Tsukuba, Japan Carles Padró Universitat Politecnica Catalunya, Spain Roberto Di Pietro University of Roma Tre, Italy Andreas Pashalidis K. U. Leuven, Belgium Rodrigo Romám University of Málaga, Spain Bimal Roy Indian Statistical Institute, India Kouichi Sakurai Kyushu University, Japan Pierangela Samarati University of Milan, Italy Ben Smyth University of Birmingham, United Kingdom Willy Susilo University of Wollongong, Australia Guilin Wang University of Birmingham, UK Duncan S. Wong City University of Hong Kong, China Wenling Wu Institute of Software, Chinese Academy of Sciences, China Yongdong Wu Institute for Infocomm Research, Singapore Jianying Zhou Institute for Infocomm Research, Singapore
Current thread:
- Call for participation ICICS 2010. December 15-17, 2010 Juan Hernández Serrano (Oct 28)