[prev in list] [next in list] [prev in thread] [next in thread]
List: isn
Subject: [ISN] Financial Crypto and Data Security 2010: Announcing 3
From: InfoSec News <alerts () infosecnews ! org>
Date: 2009-09-28 5:12:24
Message-ID: Pine.LNX.4.61.0909280011243.20013 () conundrum ! infosecnews ! org
[Download RAW message or body]
Forwarded from: Conference Mailer <noreply (at) moon.crypto.cs.stonybrook.edu>
Dear Colleagues,
We are glad to announce 3 workshops co-located with the Financial
Cryptography and Data Security Conference.
---
Workshop on Real-Life Cryptographic Protocols and Standardization
https://www.nec.co.jp/rd/en/event/RLCPS10.html
Paper Submission Deadline: October 2, 2009, midnight PST
As a fruit of modern cryptographic research, we have seen many
cryptographic primitives such as public-key encryption and digital
signature algorithms deployed in real life systems, and standardized in
many international organizations such as ISO, ITUT, IEEE, IETF, and many
others. We have also seen some cryptographic protocols as well, such as
key distribution and entity authentication, and some dedicated protocols
for limited purpose systems. This workshop aims to bring researchers and
engineers together to share their experiments regarding the design of
cryptographic primitives and protocols deployed in real life systems.
These schemes may not be published in current conferences due to the
perceived lack of novelty of their core design components. However, the
process of designing the best suitable protocol in the presence of
hardware and software limitations in a real life system is worth
sharing. This workshop also aims to stimulate discussions on
standardizing cryptographic protocols.
---
Workshop on Ethics in Computer Security Research (WECSR 2010)
http://www.cs.stevens.edu/~spock/wecsr2010/
Submissions Due: October 15, 2009, 11:59pm, EDT (UTC-4)
Computer security often leads to discovering interesting new problems
and challenges. The challenge still remains to follow a path acceptable
for Institutional Review Boards at academic institutions, as well as
compatible with ethical guidelines for professional societies or
government institutions. However, no exact guidelines exist for computer
security research yet. This workshop will bring together computer
security researchers, practitioners, policy makers, and legal experts.
This workshop solicits submissions describing or suggesting ethical and
responsible conduct in computer security research. While we focus on
setting standards and sharing prior experiences and experiments in
computer security research, successful or not, we tap into research
behavior in network security, computer security, applied cryptography,
privacy, anonymity, and security economics. This workshop will favor
discussions among participants, in order to shape the future of ethical
standards in the field. It will be co-located with the Fourteenth
International Conference on Financial Cryptography and Data Security 2010.
---
Workshop on Lightweight Cryptography for Resource-Constrained Devices
http://www.wlc2010.udl.cat/
Paper submission: September 30, 2009
Lightweight devices like smart cards and RFID tags are at the core of
novel emerging technologies in the information society. These devices
must be cheap so as to permit their cost-effective massive manufacturing
and deployment. Unfortunately, their low-cost limits their computational
power. Other devices, like nodes of sensor networks suffer from an
additional constraint, namely, their limited battery life. Secure
applications designed for these devices can not make use of classical
cryptographic primitives designed for full-fledged computers. In this
sense, research on low-cost cryptography is fundamental. This workshop
aims to be a forum for the presentation and discussion of current
research on different topics related to low-cost cryptography, from
cipher design to implementation details.
------------------------------------------------------------------
Financial Cryptography and Data Security
Tenerife, Canary Islands, Spain
25-28 January 2010
http://fc10.ifca.ai
Financial Cryptography and Data Security is a major international forum
for research, advanced development, education, exploration, and debate
regarding information assurance, with a specific focus on commercial
contexts. The conference covers all aspects of securing transactions and
systems.
INVITED SPEAKERS
Lorrie Cranor, CMU
http://lorrie.cranor.org/
Ueli Maurer, ETH Zurich
http://www.crypto.ethz.ch/~maurer/
Jean-Pierre Hubaux, EPFL
http://people.epfl.ch/jean-pierre.hubaux
WORKSHOPS
Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS.10)
https://www.nec.co.jp/rd/en/event/RLCPS10.html
Workshop on Ethics in Computer Security Research (WECSR 2010)
http://www.cs.stevens.edu/~spock/wecsr2010/
Workshop on Lightweight Cryptography for
Resource-Constrained Devices (WLC'2010)
http://www.wlc2010.udl.cat/
IMPORTANT DATES
Paper Notification: November 14, 2009
Final Papers: November 29, 2009
Poster and Panel Submission: November 10, 2009
Poster and Panel Notification: November 20, 2009
ORGANIZERS
General Chair: Pino Caballero-Gil, University of La Laguna
Local Chair: Candelaria Hernandez-Goya, University of La Laguna
Local Committee
Luisa Arranz Chacon, Alcatel Espana, S.A.
Candido Caballero Gil, University of La Laguna
Amparo Fter Sabater, IFA-CSIC
Felix Herrera Priano, University of La Laguna
Belen Melian Batista, University of La Laguna
Jezabel Molina Gil, University of La Laguna
Jose Moreno Perez, University of La Laguna
Marcos Moreno Vega, University of La Laguna
Alberto Peinado Dominguez, University of Malaga
Alexis Quesada Arencibia, University of Las Palmas de Gran Canaria
Jorge Ramio Aguirre, Polytechnic University of Madrid
Victoria Reyes Sanchez, University of La Laguna
PROGRAM COMMITTEE
Program Chair: Radu Sion, Stony Brook University
Ross Anderson, University of Cambridge
Lucas Ballard, Google Inc.
Adam Barth, UC Berkeley
Marina Blanton, University of Notre Dame
Luc Bouganim, INRIA Rocquencourt
Bogdan Carbunar, Motorola Labs
Ivan Damgard, Aarhus University
Ernesto Damiani, University of Milano
George Danezis, Microsoft Research
Sabrina de Capitani di Vimercati, University of Milano
Rachna Dhamija, Harvard University
Sven Dietrich, Stevens Institute of Technology
Roger Dingledine, The Tor Project
Josep Domingo-Ferrer, University of Rovira i Virgili
Stefan Dziembowski, University of Rome "La Sapienza"
Bernhard Esslinger, Siegen University
Simone Fischer-Hner, Karlstad University
Amparo Fuster-Sabater, Instituto de Fica Aplicada Madrid
Philippe Golle, Palo Alto Research Center
Dieter Gollmann, Technische Universitaet Hamburg-Harburg
Rachel Greenstadt, Drexel University
Markus Jakobsson, Palo Alto Research Center and Indiana University
Rob Johnson, Stony Brook University
Ton Kalker, HP Labs
Stefan Katzenbeisser, Technische Universit Darmstadt
Angelos Keromytis, Columbia University
Lars R. Knudsen, Technical University of Denmark
Wenke Lee, Georgia Tech
Arjen Lenstra, Ecole Polytechnique Federale de Lausanne (EPFL) and
Alcatel-Lucent Bell Laboratories
Helger Lipmaa, Cybernetica AS
Javier Lopez, University of Malaga
Luigi Vincenzo Mancini, University of Rome "La Sapienza"
Refik Molva, Eurecom Sophia Antipolis
Fabian Monrose, University of North Carolina at Chapel Hill
Steven Murdoch, University of Cambridge
David Naccache, Ecole Normale Superieure (ENS)
David Pointcheval, Ecole Normale Superieure (ENS) and CNRS
Bart Preneel, Katholieke Universiteit Leuven
Josep Rifa Coma, Autonomous University of Barcelona
Ahmad-Reza Sadeghi, Ruhr-University Bochum
Angela Sasse, University College London
Vitaly Shmatikov, University of Texas at Austin
Miguel Soriano, Polytechnic University of Catalonia
Miroslava Sotakova, Aarhus University
Angelos Stavrou, George Mason University
Patrick Traynor, Georgia Tech
Nicholas Weaver, International Computer Science Institute Berkeley
Proceedings Chair: Reza Curtmola, New Jersey Institute of Technology
Poster Chair: Peter Williams, Stony Brook University
________________________________________
Did a friend send you this? From now on, be the
first to find out! Subscribe to InfoSec News
http://www.infosecnews.org
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic