-------- Original-Nachricht --------
Betreff: [computational.science] ESORICS 2010 - call for participation (program now available)
Datum: Wed, 07 Jul 2010 11:26:29 +0200
Von: sara.foresti@unimi.it
Antwort an: sara.foresti@unimi.it
Organisation: "ICCSA"
An: Computational Science Mailing List <computational.science@lists.iccsa.org>


[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION

***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************

ABOUT THE CONFERENCE

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing
together researchers in this area, by promoting the exchange of ideas
with system developers and by encouraging links with researchers in
related areas.

Progressively organized in a series of European countries, the
symposium is confirmed as the European research event in computer
security.

The Symposium is under the aegis of the Greek:
 * Ministry of of Infrastructure, Transport and Networks
 * Ministry of Economy and Finance:
   General Secretariat for Information Systems
 * Ministry of Interior, Decentralization and e-Government:
   General Secretariat for Electronic Governance


REGISTRATION

Registration information is available at:
https://www.triaenatours.gr/esorics.php


PROGRAM	

Sunday, 19 September 2010
-------------------------

18:30 - 20:00  Registration

______________________________________________________________________


Monday, 20 September 2010
-------------------------

09:00 - 10:00  Registration

10:00 - 10:30  Opening

* Welcome address
  S. Katsikas, ESORICS-2010 General Chair

* Technical Program Overview
  B. Preneel and D. Gritzalis, Program Committee Chairs

* Local arrangements
  N. Kyrloglou and M. Theoharidou, Organizing Committee Chairs

10:30 - 11:00  Coffee/tea

11:00 - 13:00  Session 1: RFID and Privacy

* Deng R., Li Y., Yung M., Zhao Y.
  "A New Framework for RFID Privacy"

* Nithyanand R., Tsudik G., Uzun E.,
  "Readers Behaving Badly: Reader Revocation in PKI-Based
   RFID Systems"

* Androulaki E., Vo B., Bellovin S.,
  "Privacy-Preserving, Taxable Bank Accounts"

* Dahl M., Delaune S., Steel G.,
  "Formal Analysis of Privacy for Vehicular Mix-Zones"

13:00 - 14:00  Lunch

14:00 - 16:00  Session 2: Software Security 	

* Zhang C., Wang T., Wei T., Chen Y., Zou W.,
  "IntPatch: Automatically Fix Integer Overflow-to-Buffer-Overflow
   Vulnerability at Compile-Time"

* Ligatti J., Reddy S.,
  "A Theory of Runtime Enforcement, with Results"

* Hubert L., Jensen T., Monfort V., Pichardie D.,
  "Enforcing Secure Object Initialization in Java"

* Mantel H., Sudbrock H.,
  "Flexible Scheduler-Independent Security"

16:00 - 16:30  Coffee/tea

16:30 - 18:30  Session 3: Cryptographic Protocols	

* Catrina O., de Hoogh S.,
  "Secure Multiparty Linear Programming Using Fixed-Point Arithmetic"

* Almeida J.-B., Bangerter E., Barbosa M., Krenn S.,
  Sadeghi A.-R., Schneider T.,
  "A Certifying Compiler for Zero-Knowledge Proofs of
   Knowledge based on S-Protocols"

* Liu J., Au M.-H., Susilo W., Zhou J.,
  "Short Generic Transformation to Strongly Unforgeable
   Signature in the Standard Model"

* Xu W., Ahn G.-J., Hu H., Zhang X., Seifert J.-P.,
  "DR@FT: Efficient Remote Attestation Framework for Dynamics Systems"

20:00 - 22:00  Symposium Dinner

______________________________________________________________________

Tuesday, 21 September 2010
--------------------------

08:30 - 10:30  Session 4: Traffic Analysis	

* Lu L., Chang E.-C., Chan M.-C.,
  "Website Fingerprinting and Identification Using Ordered
   Feature Sequences"

* Janc A., Olejnik L.,
  "Web Browser History Detection as a Real-World Privacy Threat"

* Luo X., Zhang J., Perdisci R., Lee W.,
  "On the Secrecy of Spread-Spectrum Flow Watermarks"

* Chakravarty S., Stavrou A., Keromytis A.,
  "Traffic Analysis against Low-Latency Anonymity Networks
   Using Available Bandwidth Estimation"

10:30 - 11:00  Coffee/tea

11:00 - 12:00  Invited talk
Chairperson: Gritzalis D., AUEB

* Helmbrecht U., ENISA,
  "Cryptography and Privacy in Cloud Computing"

12:00 - 13:00  Session 5: End-User Security

* Xiang G., Pendleton B., Hong J., Rose C.,
  "A Hierarchical Adaptive Probabilistic Approach
   for Zero Hour Phish Detection"

* Bojinov H., Bursztein E., Boneh D., Boyen X.,
  "Kamouflage: Loss-Resistant Password Management"

13:00 - 14:00  Lunch

14:00 - 16:00  Session 6: Formal Analysis

* Escobar S., Meadows C., Meseguer J., Santiago S.,
  "Sequential Protocol Composition in Maude-NPA"

* Dinh T.-T.-A., Ryan M.,
  "Verifying Security Property of Peer-to-Peer Systems Using CSP"

* Basin D., Cremers C.,
  "Modeling and Analyzing Security in the Presence of
   Compromising Adversaries"

* Yasuoka H., Terauchi T.,
  "On Bounding Problems of Quantitative Information Flow"

16:00 - 16:30  Coffee/tea

16:30 - 18:30  Session 7: E-voting and Broadcast

* Heiberg S., Lipmaa H., van Laenen F.,
  "On E-Vote Integrity in the Case of Malicious Voter Computers"

* Kremer S., Smyth B., Ryan M.,
  "Election Verifiability in Electronic Voting Protocols"

* Heather J., Ryan P., Teague V.,
  "Pretty Good Democracy for more expressive voting schemes"

* Blanton M., Frikken K.,
  "Efficient Multi-Dimensional Key Management in Broadcast Services"

______________________________________________________________________

Wednesday, 22 September 2010
----------------------------

08:30 - 10:30  Session 8: Authentication, Access Control,
                          Authorization and Attestation 	

* Meier J., Gollmann D.,
  "Caught in the Maze of Security Standards"

* Gofman M., Luo R., Yang P.,
  "User-Role Reachability Analysis of Evolving Administrative
   Role Based Access Control"

* Crampton J., Huth M.,
  "An Authorization Framework Resilient to Policy Evaluation Failures"

* Kupcu A., Lysyanskaya A.,
  "Optimistic Fair Exchange with Multiple Arbiters"

10:30 - 11:00  Coffee/tea

11:00 - 13:00  Session 9: Anonymity and Unlinkability

* Backes M., Doychev G., Duermuth M., Koepf B.,
  "Speaker Recognition in Encrypted Voice Streams"

* Pashalidis A., Schiffner S.,
  "Evaluating Adversarial Partitions"

* Ardagna C., Jajodia S., Samarati P., Stavrou A.,
  "Providing Mobile Users' Anonymity in Hybrid Networks"

* Tiplea F.-L., Vamanu L., Varlan C.,
  "Complexity of Anonymity for Security Protocols"

13:00 - 14:00  Lunch

14:00 - 16:00  Session 10: Network Security and Economics

* Wang L., Jajodia S., Singhal A., Noel S.,
  "k-Zero Day Safety: Measuring the Security Risk of
   Networks against Unknown Attacks"

* Johnson B., Grossklags J., Christin N., Chuang J.,
  "Are Security Experts Useful? Bayesian Nash Equilibria for Network
   Security Games with Limited Information"

* Backes M., Ciobotaru O., Krohmer A.,
  "RatFish: A File Sharing Protocol Provably Secure
   Against Rational Users"

* Kheir N., Cuppens-Boulahia N., Cuppens F., Debar H.,
  "A Comprehensive Approach for Cost-Sensitive Intrusion Response"

16:00 - 16:30  Coffee/tea

16:00 - 18:00 Session 11: Secure Update, DOS and Intrusion Detection

* Perito D., Tsudik G.,
  "Secure Code Update for Embedded Devices via Proofs of
   Secure Erasure"

* Kapravelos A., Polakis I., Athanasopoulos E., Ioannidis S.,
  Markatos E.,
  "D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks"

* Karame G., Capkun S.,
  "Low-Cost Client Puzzles based on Modular Exponentiation"

* Tokhtabayev A., Skormin V., Dolgikh A.,
  "Expressive, Efficient and Obfuscation Resilient Behavior Based IDS"

18:00  Farewell



MORE INFORMATION

Additional information about the conference can be found at:
www.esorics2010.org

---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe@lists.iccsa.org
For additional commands, e-mail: computational.science-help@lists.iccsa.org