[Apologies if you receive multiple copies of this message]

                       * Registration is now open *

                         CALL FOR PARTICIPATION

***********************************************************************
            12th Information Security Conference (ISC 2009)
                  Pisa, Italy -- September 7-9, 2009
                      http://isc09.dti.unimi.it
***********************************************************************


ABOUT THE CONFERENCE

ISC is an annual international conference covering research in and
applications of information security. The twelfth Information
Security Conference (ISC 2009) will be held in Pisa, Italy.  The
conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
information security.

The twelfth Information Security Conference (ISC 2009) will be held in
Pisa, Italy.


LIST OF ACCEPTED PAPERS

* Full Papers
10  - Detection of Database Intrusion using a Two-Stage Fuzzy System
      Suvasini Panigrahi and Shamik Sural
17  - F3ildCrypt: End-to-End Protection of Sensitive Information in Web
      Services
      Matthew Burnside and Angelos Keromytis
21  - On the security of Identity Based Ring Signcryption Schemes
      Sharmila Deva Selvi S., Sree Vivek S., and Pandu Rangan C.
22  - Privacy-aware Attribute-based Encryption with User Accountability
      Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan
24  - An efficient distance bounding RFID authentication protocol:
      balancing false-acceptance rate and memory requirement
      Gildas Avoine and Aslan Tchamkerten
28  - Combining Consistency and Confidentiality Requirements in
      First-Order Databases
      Joachim Biskup and Lena Wiese
29  - Analysis and Optimization of Cryptographically Generated Addresses
      Joppe Bos, Onur Ozen, and Jean-Pierre Hubaux
33  - Hardware-Assisted Application-Level Access Control
      Yu-Yuan Chen and Ruby B. Lee
43  - Fair E-cash: Be Compact, Spend Faster
      Sébastien Canard, Cécile Delerablée, Aline Gouget,
      Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert,
      Jacques Traore, and Damien Vergnaud
53  - Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
      Mario Lamberger and Florian Mendel
54  - Security Analysis of the PACE Key-Agreement Protocol
      Jens Bender, Marc Fischlin, and Dennis Kuegler
64  - A Storage Efficient Redactable Signature in the Standard Model
      Ryo Nojima, Jin Tamura, Youki Kadobayashi, and Hiroaki Kikuchi
68  - Towards Unifying Vulnerability Information for Attack Graph
      Construction
      Sebastian Roschke, Feng Cheng, Robert Schuppenies, and
      Christoph Meinel
70  - A New Approach to chi^2 Cryptanalysis of Block Ciphers
      Jorge Nakahara Jr, Gautham Sekar, Daniel Santana de Freitas,
      Chang Chiann, Ramon Hugo de Souza, and Bart Preneel
73  - Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext
      Security
      Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, and Feng Bao
74  - Nonce Generators and the Nonce Reset Problem
      Erik Zenner
76  - A New Construction of Boolean Functions with Maximum Algebraic
      Immunity
      Deshuai Dong, Shaojing Fu, Longjiang Qu, and Chao Li
80  - Automated Spyware Collection and Analysis
      Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, and
      Engin Kirda
81  - Peer-to-peer architecture for collaborative intrusion detection
      and malware analysis on a large scale
      Michele Colajanni, Mirco Marchetti, and Michele Messori
83  - MAC Precomputation with Applications to Secure Memory
      Juan A. Garay, Vladimir Kolesnikov, and Rae McLellan
85  - Robust Authentication Using Physically Unclonable Functions
      Keith Frikken, Marina Blanton, and Mikhail Atallah
90  - On Free-Start Collisions and Collisions for TIB3
      Florian Mendel and Martin Schläffer
92  - Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
      Yu Sasaki
94  - A2M: Access-Assured Mobile Desktop Computing
      Angelos Stavrou, Angelos Keromytis, and Jason Nieh
95  - Adding Trust to P2P Distribution of Paid Content
      Angelos Stavrou, Alex Sherman, Jason Nieh, and Angelos Keromytis
96  - Towards Trustworthy Delegation in Role-Based Access Control Models
      Manachai Toahchoodee, Xing Xie, and Indrakshi Ray
98  - HMAC without the "Second" Key
      Kan Yasuda
101 - Risks of the CardSpace Protocol
      Sebastian Gajek, Michael Steiner, Joerg Schwenk, and Chen Xuan
105 - Practical Algebraic Attacks on the Hitag2 Stream Cipher
      Nicolas T. courtois, Sean O'Neil, and Jean-Jacques Quisquater

* Short Papers
44  - SISR - a New Model for Epidemic Spreading of Electronic Threats
      Boris Rozenberg, Ehud Gudes, and Yuval Elovici
51  - Cancelable Iris Biometrics using Block Re-mapping and Image
      Warping
      Elias Pschernig and Andreas Uhl
57  - Secure Interoperation in Multidomain Environments Based on UCON
      Model
      Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, and
      Xiaopu Ma
58  - Specification and Enforcement of Static Separation-of-Duty
      Policies in Usage Control
      Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, and Xiaopu Ma
63  - Iris Recognition in Nonideal Situations
      Kaushik Roy and Prabir Bhattacharya
77  - Generic Construction of Stateful Identity Based Encryption
      Peng Yang, Rui Zhang, Kanta Matsuura, and Hideki Imai
88  - A calculus to detect guessing attacks
      Bogdan Groza and Marius Minea
100 - Traitor Tracing without a priori bound on the Coalition Size
      Serdar Pehlivanoglu and Hongxia Jin
102 - Towards Security Notions for White-Box Cryptography
      Amitabh Saxena, Brecht Wyseur, and Bart Preneel


MORE INFORMATION

Additional information about the conference can be found at
http://isc09.dti.unimi.it/














_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to