Educause Security Discussion mailing list archives

Call for participation ICICS 2010. December 15-17, 2010


From: Juan Hernández Serrano <jserrano () ENTEL UPC EDU>
Date: Thu, 28 Oct 2010 14:54:49 +0200

** Apologies for multiple copies **

--------------------------------------------------------------------
--------------------------------------------------------------------

                            ICICS 2010
                Twelfth International Conference on
              Information and Communications Security

                     http://www.icics2010.org
                     icics2010 () entel upc edu

                         Barcelona, Spain
                       15-17 December, 2010

                      CALL FOR PARTICIPATION

--------------------------------------------------------------------
--------------------------------------------------------------------

Information and communication security must provide technological
solutions to the tension between the accelerating growth of social,
economical and governmental demand for digitalization of
information on the one hand, and on the other, the legal and
ethical obligation to protect the individuals and organizations
involved.

The 2010 International Conference on Information and Communications
Security (ICICS 2010) will be the 12th event in the ICICS
conference series, started in 1997, which brought together lead
researchers and engineers involved in multiple disciplines of
information and communications security, to foster the exchange of
ideas in aspects including, but not limited to, authentication and
authorization, distributed and mobile systems security, e-commerce,
fraud control, intellectual property protection, operating system
security, anonymity and privacy, and trusted computing.

In response to the call for papers, 135 submissions were received
to this year’s installment of the conference series. Each paper
received at least three peerreviews on the basis of its
significance, novelty, technical quality and relevance to this
event. The highly competitive selection process could accept only
31 papers, subject to a final revision before publication.


--------------------------------------------------------------------
Registration
--------------------------------------------------------------------

Registration (http://www.icics2010.org/registration) is open and
includes:
   1. A copy of the conference proceedings
   2. Admission to all conference sessions
   3. Lunch and mid-conference refreshments
   4. Social event and conference banquet

ICICS 2010 will be held at the Catalonia Barcelona Plaza hotel.
This imposing hotel is situated in Plaza España, next to the Fira
de Barcelona facilities and Montjuïc. Guests can enjoy excellent
connections with every means of public transport. More information
can be found at http://www.icics2010.org/venue

It is advisable to make a hotel reservation as soon as possible.
More details can be found at http://www.icics2010.org/accommodation

--------------------------------------------------------------------
Invited Talks
--------------------------------------------------------------------
  Title:   Information-theoretic and combinatorial approaches to
           steganography
  Speaker: Grigori Kabatiansky
           Dobrushin Mathematical Laboratory,
           Institute of Information Transmission Problems,
           Russian Academy of Sciences, Russia

  Title:   Validating Digital Signatures as non-repudiation Evidence
  Speaker: Jianying Zhou
           Institute for Infocomm Research, Singapore

  Title:   Cryptographic hash functions: theory and practice
  Speaker: Bart Preneel
           Dept. Elektrotechniek-ESAT /COSIC,
           Katholieke Universiteit Leuven, Belgium


--------------------------------------------------------------------
Conference Program
--------------------------------------------------------------------

For a more in detail conference progran please visit us at
http://www.icics2010.org/program

Session 1A: Access control
  "Rewriting of SPARQL/Update Queries for Securing Data access"
  Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens,
  Stephane Morucci

  "Fine-Grained Disclosure of Access Policies"
  Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara
  Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss,
  Pierangela Samarati, Mario Verdicchio

Session 1B. Public key cryptography and cryptanalysis
  "Manger’s Attack revisited"
  Falko Strenzke

  "Horizontal Correlation Analysis on Exponentiation"
  Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène
  Roussellet, Vincent Verneuil

  "Threshold Public-key Encryption with Adaptive Security and Short
  Ciphertexts"
  Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer

Session 1C. Security in distributed and mobile systems

  "A Trust-Based Robust and Efficient Searching Scheme for
  Peer-to-Peer Networks"
  Jaydip Sen

  "CUDACS: Securing the Cloud with CUDA-enabled Secure
  Virtualization"
  Flavio Lombardi, Roberto Di Pietro

  "SEIP: Simple and Efficient Integrity Protection for Open Mobile
  Platforms"
  Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez

  "A Fast and Secure Passport-Visa Authentication Scheme for
  Wireless Communications"
  Talal Alharbi, Abdullah Almuhaideb, Phu Dung Le

  "Compromise-Resilient Anti-Jamming for Wireless Sensor Networks"
  Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao

Session 1D. Cryptanalysis
  "On Practical Second-Order Power Analysis Attacks"
  Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro
  Trifiletti

  "Consecutive S-box Lookups: A Timing Attack on SNOW 3G"
  Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio

Session 2A. Authentication
  "Efficient Authentication for Mobile and Pervasive Computing"
  Basel Alomair, Radha Poovendran

  "Security Enhancement and Modular Treatment Towards Authenticated
  Key Exchange"
  Jiaxin Pan, Libin Wang, Changshe Ma

  "Federated Secret Handshakes with Support for Revocation"
  Alessandro Sorniotti, Refik Molva

Session 2B. Fair exchange protocols
  "An Agent-Mediated Fair Exchange Protocol"
  Gerard Draper Gil, Jianying Zhou, Josep LLu´ıs Ferrer-Gomila

  "A New Method for Formalizing Optimistic Fair Exchange Protocols"
  Ming Chen, Kaigui Wu, Jie Xu, Pan He

  "Unconditionally Secure First-Price Auction Protocols Using a
  Multicomponent Commitment Scheme"
  Mehrdad Nojoumian, Douglas R. Stinson

Session 2C. Anonymity and privacy
  "Proving Coercion-Resistance of Scantegrity II"
  Ralf Küsters, Tomasz Truderung, Andreas Vogt

  "Anonymity and Verifiability in Voting: Understanding
  (Un)Linkability"
  Lucie Langer, Hugo Jonker, Wolter Pieters

  "A Secure and Practical Approach for Providing Anonymity
  Protection for Trusted Platforms"
  Kurt Dietrich, Johannes Winter

  "TimeWarp: how time affects privacy in LBSs.Threats and
  countermeasures"
  Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti

Session 2D. Software security
  "Return-oriented Rootkit without Returns (on the x86)"
  Ping Chen, Xiao Xing, Bing Mao, Li Xie

  "Experimental threat model reuse with misuse case diagrams"
  Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland

  "Automatically Generating Patch in Binary Programs Using
  Attribute-based Taint Analysis"
  Kai Chen, Yifeng Lian, Yingjun Zhang

Session 3A. Proxy cryptosystems
  "Identity-Based Proxy Cryptosystems with Revocability and
  Hierarchical Confidentialities"
  Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto

  "Ciphertext Policy Attribute-based Proxy Re-encryption"
  Song Luo, Jianbin Hu, Zhong Chen

Session 3B. Intrusion detection systems
  "Hybrid detection of application layer attacks using Markov
  models for normality and attacks"
  Rolando Salazar-Hernández, Jesús E. Díaz-Verdejo

  "A Trust-based IDS for the AODV Protocol"
  Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent

  "IDS Alert Visualization and Monitoring through Heuristic Host
  Selection"
  Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani

  "A Two-tier System for Web Attack Detection Using Linear
  Discriminant Method"
  Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren
  Ping Liu, Wenjing Jia, Wei-chang Yeh


--------------------------------------------------------------------
Conference Committee
--------------------------------------------------------------------

General Chair:
      Javier López
        University of Málaga, Spain

Program Co-Chairs:
      Sihan Qing
        Peking University, China
      Miguel Soriano
        Universitat Politècnica de Catalunya, Spain

Publication Chair:
      Juan Hernández-Serrano
        Universitat Politècnica de Catalunya, Spain

Program Committee Members:
      Mikhail Atallah
        Purdue University, USA
      Alex Biryukov
        University of Luxembourg, Luxembourg
      Frederic Cuppens
        Telecom Bretagne, France
      Jesus Díaz-Verdejo
        University of Granada, Spain
      Josep Domingo-Ferrer
        Universitat Rovira i Virgili, Catalonia
      Óscar Esparza
        Universitat Politècnica de Catalunya, Spain
      Praveen Gauravaram
        Technical University of Denmark, Denmark
      Antonio F. Gómez-Skarmeta
        University of Murcia, Spain
      Juan González-Nieto
        Queensland University of Technology, Australia
      Yong Guan
        Iowa State University, USA
      James Heather
        University of Surrey, UK
      Juan Hernández-Serrano
        Universitat Politècnica de Catalunya, Spain
      Chi-Sung Laih
        National Cheng Kung University, Taiwan
      Yingjiu Li
        Singapore Management University,Singapore
      Wenbo Mao
        EMC, USA
      Chris Mitchell
        University of London, United Kingdom
      Eiji Okamoto
        University of Tsukuba, Japan
      Carles Padró
        Universitat Politecnica Catalunya, Spain
      Roberto Di Pietro
        University of Roma Tre, Italy
      Andreas Pashalidis
        K. U. Leuven, Belgium
      Rodrigo Romám
        University of Málaga, Spain
      Bimal Roy
        Indian Statistical Institute, India
      Kouichi Sakurai
        Kyushu University, Japan
      Pierangela Samarati
        University of Milan, Italy
      Ben Smyth
        University of Birmingham, United Kingdom
      Willy Susilo
        University of Wollongong, Australia
      Guilin Wang
        University of Birmingham, UK
      Duncan S. Wong
        City University of Hong Kong, China
      Wenling Wu
        Institute of Software, Chinese Academy of Sciences, China
      Yongdong Wu
        Institute for Infocomm Research, Singapore
      Jianying Zhou
        Institute for Infocomm Research, Singapore


Current thread: