[Apologies if you receive multiple copies of this message] * Registration is now open *
CALL FOR PARTICIPATION *********************************************************************** 12th Information Security Conference (ISC 2009) Pisa, Italy -- September 7-9, 2009 http://isc09.dti.unimi.it *********************************************************************** ABOUT THE CONFERENCE ISC is an annual international conference covering research in and applications of information security. The twelfth Information Security Conference (ISC 2009) will be held in Pisa, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of information security. The twelfth Information Security Conference (ISC 2009) will be held in Pisa, Italy. LIST OF ACCEPTED PAPERS * Full Papers 10 - Detection of Database Intrusion using a Two-Stage Fuzzy System Suvasini Panigrahi and Shamik Sural 17 - F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Matthew Burnside and Angelos Keromytis 21 - On the security of Identity Based Ring Signcryption Schemes Sharmila Deva Selvi S., Sree Vivek S., and Pandu Rangan C. 22 - Privacy-aware Attribute-based Encryption with User Accountability Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan 24 - An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement Gildas Avoine and Aslan Tchamkerten 28 - Combining Consistency and Confidentiality Requirements in First-Order Databases Joachim Biskup and Lena Wiese 29 - Analysis and Optimization of Cryptographically Generated Addresses Joppe Bos, Onur Ozen, and Jean-Pierre Hubaux 33 - Hardware-Assisted Application-Level Access Control Yu-Yuan Chen and Ruby B. Lee 43 - Fair E-cash: Be Compact, Spend Faster Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traore, and Damien Vergnaud 53 - Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n Mario Lamberger and Florian Mendel 54 - Security Analysis of the PACE Key-Agreement Protocol Jens Bender, Marc Fischlin, and Dennis Kuegler 64 - A Storage Efficient Redactable Signature in the Standard Model Ryo Nojima, Jin Tamura, Youki Kadobayashi, and Hiroaki Kikuchi 68 - Towards Unifying Vulnerability Information for Attack Graph Construction Sebastian Roschke, Feng Cheng, Robert Schuppenies, and Christoph Meinel 70 - A New Approach to chi^2 Cryptanalysis of Block Ciphers Jorge Nakahara Jr, Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, and Bart Preneel 73 - Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, and Feng Bao 74 - Nonce Generators and the Nonce Reset Problem Erik Zenner 76 - A New Construction of Boolean Functions with Maximum Algebraic Immunity Deshuai Dong, Shaojing Fu, Longjiang Qu, and Chao Li 80 - Automated Spyware Collection and Analysis Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, and Engin Kirda 81 - Peer-to-peer architecture for collaborative intrusion detection and malware analysis on a large scale Michele Colajanni, Mirco Marchetti, and Michele Messori 83 - MAC Precomputation with Applications to Secure Memory Juan A. Garay, Vladimir Kolesnikov, and Rae McLellan 85 - Robust Authentication Using Physically Unclonable Functions Keith Frikken, Marina Blanton, and Mikhail Atallah 90 - On Free-Start Collisions and Collisions for TIB3 Florian Mendel and Martin Schläffer 92 - Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL Yu Sasaki 94 - A2M: Access-Assured Mobile Desktop Computing Angelos Stavrou, Angelos Keromytis, and Jason Nieh 95 - Adding Trust to P2P Distribution of Paid Content Angelos Stavrou, Alex Sherman, Jason Nieh, and Angelos Keromytis 96 - Towards Trustworthy Delegation in Role-Based Access Control Models Manachai Toahchoodee, Xing Xie, and Indrakshi Ray 98 - HMAC without the "Second" Key Kan Yasuda 101 - Risks of the CardSpace Protocol Sebastian Gajek, Michael Steiner, Joerg Schwenk, and Chen Xuan 105 - Practical Algebraic Attacks on the Hitag2 Stream Cipher Nicolas T. courtois, Sean O'Neil, and Jean-Jacques Quisquater * Short Papers 44 - SISR - a New Model for Epidemic Spreading of Electronic Threats Boris Rozenberg, Ehud Gudes, and Yuval Elovici 51 - Cancelable Iris Biometrics using Block Re-mapping and Image Warping Elias Pschernig and Andreas Uhl 57 - Secure Interoperation in Multidomain Environments Based on UCON Model Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, and Xiaopu Ma 58 - Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, and Xiaopu Ma 63 - Iris Recognition in Nonideal Situations Kaushik Roy and Prabir Bhattacharya 77 - Generic Construction of Stateful Identity Based Encryption Peng Yang, Rui Zhang, Kanta Matsuura, and Hideki Imai 88 - A calculus to detect guessing attacks Bogdan Groza and Marius Minea 100 - Traitor Tracing without a priori bound on the Coalition Size Serdar Pehlivanoglu and Hongxia Jin 102 - Towards Security Notions for White-Box Cryptography Amitabh Saxena, Brecht Wyseur, and Bart Preneel MORE INFORMATION Additional information about the conference can be found at http://isc09.dti.unimi.it/ _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers