[Apologies if you receive multiple copies of this message] CALL FOR PARTICIPATION
********************************************************************** 14th Information Security Conference (ISC 2011) Xi'an, China -- 26-29 October, 2011 http://ste.xidian.edu.cn/isc2011/ ********************************************************************** ABOUT THE CONFERENCE The 14th Information Security Conference (ISC 2011) will be held in Xi'an, China. It will be sponsored by China Computer Federation (CCF) and co-organized by Xidian University. The conference website is http://ste.xidian.edu.cn/isc2011/. The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. The conference will be a 3-day event featuring technical presentations of 25 technical papers. It also includes two keynote speeches. REGISTRATION Registration information is available at http://ste.xidian.edu.cn/isc2011/regist.html Early registration fees apply until 15 September, 2011. PROGRAM Wednesday, 26 October 2011 -------------------------- 16:00 - 20:00 Registration on Site 18:30 - 21:00 Welcome Reception ====================================================================== Thursday, 27 October 2011 ------------------------- 09:00 - 09:30 Opening/Photo 09:30 - 10:30 Keynote 1: Feng Bao [Session Chair: Xuejia Lai] 10:30 - 11:00 Coffee Break 11:00 - 12:30 ATTACKS - Replacement Attacks on Behavior Based Software Birthmark (Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, and Li Xie) - Attacking Traitor Tracing Schemes using History Recording and Abrupt Decoders (Aggelos Kiayias and Serdar Pehlivanoglu) - How to Find Short RC4 Colliding Key Pairs (Jiageng Chen and Atsuko Miyaji) 12:30 - 14:00 Lunch 14:00 - 15:30 PROTOCOLS - A Formal Approach to Distance-Bounding RFID Protocols (Cristina Onete, Marc Fischlin, Michael Kasper, and Ulrich Duerholz) - MASHA - Low Cost Authentication with a New Stream Cipher (Shinsaku Kiyomoto, Matt Henricksen, Wun-She Yap, Yuto Nakano, and Kazuhide Fukushima) - Certificateless Authenticated Key Agreement Protocol without Bilinear Pairings (Hu Xiong, Qianhong Wu, and Zhong Chen) 15:30 - 16:00 Coffee Break 16:00 - 17:30 PUBLIC-KEY CRYPTOSYSTEMS - Security Analysis of an RSA Key Generation Algorithm with a Large Private Key (Fanyu Kong, Jia Yu, and Lei Wu) - Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption (Keita Emura, Atsuko Miyaji, and Kazumasa Omote) - The n-Diffie-Hellman Problem and its Applications (Liqun Chen and Yu Chen) ====================================================================== Friday, 28 October 2011 ----------------------- 09:00 - 10:00 NETWORK SECURITY - RatBot: Anti-Enumeration Peer-to-Peer Botnets (Guanhua Yan, Songqing Chen, and Stephan Eidenbenz) - Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes (Ge Zhang and Simone Fischer-Huebner) 10:00 - 11:00 SOFTWARE SECURITY - Multi-Stage Binary Code Obfuscation Using Improved Virtual Machine (Hui Fang, Yong Dong Wu, Shuhong Wang, and Yin Huang) - Detection and Analysis of Cryptographic Data inside Software (Ruoxu Zhao, Dawu Gu, Juanru Li, and Ran Yu) 11:00 - 11:30 Coffee Break 11:30 - 12:30 Keynote 2: Dieter Gollmann [Session Chair: Jianying Zhou] 12:30 - 14:00 Lunch 14:00 - 15:30 SYSTEM SECURITY - SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-On Platforms (Georgios Kontaxis, Michalis Polychronakis, and Evangelos Markatos) - Hello RootKitty: A Lightweight Invariance-Enforcing Framework (Francesco Gadaleta, Nick Nikiforakis, Yves Younan, and Wouter Joosen) - Opacity Analysis in Trust Management Systems (Moritz Y. Becker and Masoud Koleini) 15:30 - 16:00 Coffee Break 16:00 - 17:30 DATABASE SECURITY - On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints (Joachim Biskup, Marcel Preuss, and Lena Wiese) - Round-Efficient Oblivious Database Manipulation (Bingsheng Zhang, Sven Laur, and Jan Willemson) - A Privacy-Preserving Join on Outsourced Database (Sha Ma, Bo Yang, Kangshun Li, and Feng Xia) 18:30 - 21:00 Conference Dinner/Best Paper Awards ====================================================================== Saturday, 29 October 2011 ------------------------- 09:00 - 10:30 PRIVACY - APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks (Lei Zhang, Qianhong Wu, Bo Qin, and Josep Domingo-Ferrer) - Assessing Location Privacy in Mobile Communication Networks (Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, and Dirk von Suchodoletz. ) - How Much is Enough? Choosing epsilon for Differential Privacy (Jaewoo Lee and Chris Clifton) 10:30 - 11:00 Coffee Break 11:00 - 12:30 DIGITAL SIGNATURES - Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security (Yuan Zhou, Haifeng Qian, and Xiangxue Li) - An Efficient Construction of Time-Selective Convertible Undeniable Signature (Qiong Huang, Duncan S. Wong, Willy Susilo, and Bo Yang) - Efficient Fail-Stop Signatures from the Factoring Assumption (Atefeh Mashatan and Khaled Ouafi) 12:30 - 13:30 Lunch 13:30 - 18:00 Tour to Terra-Cotta Warrior and Horses Museum MORE INFORMATION Additional information about the conference can be found at http://ste.xidian.edu.cn/isc2011/ ---- [[ Petri Nets World: ]] [[ http://www.informatik.uni-hamburg.de/TGI/PetriNets/ ]] [[ Mailing list FAQ: ]] [[ http://www.informatik.uni-hamburg.de/TGI/PetriNets/pnml/faq.html ]] [[ Post messages/summary of replies: ]] [[ [email protected] ]]
