[Apologies if you receive multiple copies of this message]
* Registration is now open *
CALL FOR PARTICIPATION
***********************************************************************
12th Information Security Conference (ISC 2009)
Pisa, Italy -- September 7-9, 2009
http://isc09.dti.unimi.it
***********************************************************************
ABOUT THE CONFERENCE
ISC is an annual international conference covering research in and
applications of information security. The twelfth Information
Security Conference (ISC 2009) will be held in Pisa, Italy. The
conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
information security.
The twelfth Information Security Conference (ISC 2009) will be held in
Pisa, Italy.
LIST OF ACCEPTED PAPERS
* Full Papers
10 - Detection of Database Intrusion using a Two-Stage Fuzzy System
Suvasini Panigrahi and Shamik Sural
17 - F3ildCrypt: End-to-End Protection of Sensitive Information in Web
Services
Matthew Burnside and Angelos Keromytis
21 - On the security of Identity Based Ring Signcryption Schemes
Sharmila Deva Selvi S., Sree Vivek S., and Pandu Rangan C.
22 - Privacy-aware Attribute-based Encryption with User Accountability
Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan
24 - An efficient distance bounding RFID authentication protocol:
balancing false-acceptance rate and memory requirement
Gildas Avoine and Aslan Tchamkerten
28 - Combining Consistency and Confidentiality Requirements in
First-Order Databases
Joachim Biskup and Lena Wiese
29 - Analysis and Optimization of Cryptographically Generated Addresses
Joppe Bos, Onur Ozen, and Jean-Pierre Hubaux
33 - Hardware-Assisted Application-Level Access Control
Yu-Yuan Chen and Ruby B. Lee
43 - Fair E-cash: Be Compact, Spend Faster
Sébastien Canard, Cécile Delerablée, Aline Gouget,
Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert,
Jacques Traore, and Damien Vergnaud
53 - Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
Mario Lamberger and Florian Mendel
54 - Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, and Dennis Kuegler
64 - A Storage Efficient Redactable Signature in the Standard Model
Ryo Nojima, Jin Tamura, Youki Kadobayashi, and Hiroaki Kikuchi
68 - Towards Unifying Vulnerability Information for Attack Graph
Construction
Sebastian Roschke, Feng Cheng, Robert Schuppenies, and
Christoph Meinel
70 - A New Approach to chi^2 Cryptanalysis of Block Ciphers
Jorge Nakahara Jr, Gautham Sekar, Daniel Santana de Freitas,
Chang Chiann, Ramon Hugo de Souza, and Bart Preneel
73 - Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext
Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, and Feng Bao
74 - Nonce Generators and the Nonce Reset Problem
Erik Zenner
76 - A New Construction of Boolean Functions with Maximum Algebraic
Immunity
Deshuai Dong, Shaojing Fu, Longjiang Qu, and Chao Li
80 - Automated Spyware Collection and Analysis
Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, and
Engin Kirda
81 - Peer-to-peer architecture for collaborative intrusion detection
and malware analysis on a large scale
Michele Colajanni, Mirco Marchetti, and Michele Messori
83 - MAC Precomputation with Applications to Secure Memory
Juan A. Garay, Vladimir Kolesnikov, and Rae McLellan
85 - Robust Authentication Using Physically Unclonable Functions
Keith Frikken, Marina Blanton, and Mikhail Atallah
90 - On Free-Start Collisions and Collisions for TIB3
Florian Mendel and Martin Schläffer
92 - Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Yu Sasaki
94 - A2M: Access-Assured Mobile Desktop Computing
Angelos Stavrou, Angelos Keromytis, and Jason Nieh
95 - Adding Trust to P2P Distribution of Paid Content
Angelos Stavrou, Alex Sherman, Jason Nieh, and Angelos Keromytis
96 - Towards Trustworthy Delegation in Role-Based Access Control Models
Manachai Toahchoodee, Xing Xie, and Indrakshi Ray
98 - HMAC without the "Second" Key
Kan Yasuda
101 - Risks of the CardSpace Protocol
Sebastian Gajek, Michael Steiner, Joerg Schwenk, and Chen Xuan
105 - Practical Algebraic Attacks on the Hitag2 Stream Cipher
Nicolas T. courtois, Sean O'Neil, and Jean-Jacques Quisquater
* Short Papers
44 - SISR - a New Model for Epidemic Spreading of Electronic Threats
Boris Rozenberg, Ehud Gudes, and Yuval Elovici
51 - Cancelable Iris Biometrics using Block Re-mapping and Image
Warping
Elias Pschernig and Andreas Uhl
57 - Secure Interoperation in Multidomain Environments Based on UCON
Model
Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, and
Xiaopu Ma
58 - Specification and Enforcement of Static Separation-of-Duty
Policies in Usage Control
Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, and Xiaopu Ma
63 - Iris Recognition in Nonideal Situations
Kaushik Roy and Prabir Bhattacharya
77 - Generic Construction of Stateful Identity Based Encryption
Peng Yang, Rui Zhang, Kanta Matsuura, and Hideki Imai
88 - A calculus to detect guessing attacks
Bogdan Groza and Marius Minea
100 - Traitor Tracing without a priori bound on the Coalition Size
Serdar Pehlivanoglu and Hongxia Jin
102 - Towards Security Notions for White-Box Cryptography
Amitabh Saxena, Brecht Wyseur, and Bart Preneel
MORE INFORMATION
Additional information about the conference can be found at
http://isc09.dti.unimi.it/
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers