-------- Original-Nachricht -------- Betreff: [computational.science] ESORICS 2010 - call for participation (program now available) Datum: Wed, 07 Jul 2010 11:26:29 +0200 Von: sara.foresti@unimi.it Antwort an: sara.foresti@unimi.it Organisation: "ICCSA" An: Computational Science Mailing List computational.science@lists.iccsa.org
[Apologies if you receive multiple copies of this message]
CALL FOR PARTICIPATION
*********************************************************************** 15th European Symposium on Research in Computer Security Hotel AMARILIA, Vouliagmeni, Athens, Greece 20-22 September 2010 www.esorics2010.org ***********************************************************************
ABOUT THE CONFERENCE
ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities.
Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas.
Progressively organized in a series of European countries, the symposium is confirmed as the European research event in computer security.
The Symposium is under the aegis of the Greek: * Ministry of of Infrastructure, Transport and Networks * Ministry of Economy and Finance: General Secretariat for Information Systems * Ministry of Interior, Decentralization and e-Government: General Secretariat for Electronic Governance
REGISTRATION
Registration information is available at: https://www.triaenatours.gr/esorics.php
PROGRAM
Sunday, 19 September 2010 -------------------------
18:30 - 20:00 Registration
______________________________________________________________________
Monday, 20 September 2010 -------------------------
09:00 - 10:00 Registration
10:00 - 10:30 Opening
* Welcome address S. Katsikas, ESORICS-2010 General Chair
* Technical Program Overview B. Preneel and D. Gritzalis, Program Committee Chairs
* Local arrangements N. Kyrloglou and M. Theoharidou, Organizing Committee Chairs
10:30 - 11:00 Coffee/tea
11:00 - 13:00 Session 1: RFID and Privacy
* Deng R., Li Y., Yung M., Zhao Y. "A New Framework for RFID Privacy"
* Nithyanand R., Tsudik G., Uzun E., "Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems"
* Androulaki E., Vo B., Bellovin S., "Privacy-Preserving, Taxable Bank Accounts"
* Dahl M., Delaune S., Steel G., "Formal Analysis of Privacy for Vehicular Mix-Zones"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 2: Software Security
* Zhang C., Wang T., Wei T., Chen Y., Zou W., "IntPatch: Automatically Fix Integer Overflow-to-Buffer-Overflow Vulnerability at Compile-Time"
* Ligatti J., Reddy S., "A Theory of Runtime Enforcement, with Results"
* Hubert L., Jensen T., Monfort V., Pichardie D., "Enforcing Secure Object Initialization in Java"
* Mantel H., Sudbrock H., "Flexible Scheduler-Independent Security"
16:00 - 16:30 Coffee/tea
16:30 - 18:30 Session 3: Cryptographic Protocols
* Catrina O., de Hoogh S., "Secure Multiparty Linear Programming Using Fixed-Point Arithmetic"
* Almeida J.-B., Bangerter E., Barbosa M., Krenn S., Sadeghi A.-R., Schneider T., "A Certifying Compiler for Zero-Knowledge Proofs of Knowledge based on S-Protocols"
* Liu J., Au M.-H., Susilo W., Zhou J., "Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model"
* Xu W., Ahn G.-J., Hu H., Zhang X., Seifert J.-P., "DR@FT: Efficient Remote Attestation Framework for Dynamics Systems"
20:00 - 22:00 Symposium Dinner
______________________________________________________________________
Tuesday, 21 September 2010 --------------------------
08:30 - 10:30 Session 4: Traffic Analysis
* Lu L., Chang E.-C., Chan M.-C., "Website Fingerprinting and Identification Using Ordered Feature Sequences"
* Janc A., Olejnik L., "Web Browser History Detection as a Real-World Privacy Threat"
* Luo X., Zhang J., Perdisci R., Lee W., "On the Secrecy of Spread-Spectrum Flow Watermarks"
* Chakravarty S., Stavrou A., Keromytis A., "Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation"
10:30 - 11:00 Coffee/tea
11:00 - 12:00 Invited talk Chairperson: Gritzalis D., AUEB
* Helmbrecht U., ENISA, "Cryptography and Privacy in Cloud Computing"
12:00 - 13:00 Session 5: End-User Security
* Xiang G., Pendleton B., Hong J., Rose C., "A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection"
* Bojinov H., Bursztein E., Boneh D., Boyen X., "Kamouflage: Loss-Resistant Password Management"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 6: Formal Analysis
* Escobar S., Meadows C., Meseguer J., Santiago S., "Sequential Protocol Composition in Maude-NPA"
* Dinh T.-T.-A., Ryan M., "Verifying Security Property of Peer-to-Peer Systems Using CSP"
* Basin D., Cremers C., "Modeling and Analyzing Security in the Presence of Compromising Adversaries"
* Yasuoka H., Terauchi T., "On Bounding Problems of Quantitative Information Flow"
16:00 - 16:30 Coffee/tea
16:30 - 18:30 Session 7: E-voting and Broadcast
* Heiberg S., Lipmaa H., van Laenen F., "On E-Vote Integrity in the Case of Malicious Voter Computers"
* Kremer S., Smyth B., Ryan M., "Election Verifiability in Electronic Voting Protocols"
* Heather J., Ryan P., Teague V., "Pretty Good Democracy for more expressive voting schemes"
* Blanton M., Frikken K., "Efficient Multi-Dimensional Key Management in Broadcast Services"
______________________________________________________________________
Wednesday, 22 September 2010 ----------------------------
08:30 - 10:30 Session 8: Authentication, Access Control, Authorization and Attestation
* Meier J., Gollmann D., "Caught in the Maze of Security Standards"
* Gofman M., Luo R., Yang P., "User-Role Reachability Analysis of Evolving Administrative Role Based Access Control"
* Crampton J., Huth M., "An Authorization Framework Resilient to Policy Evaluation Failures"
* Kupcu A., Lysyanskaya A., "Optimistic Fair Exchange with Multiple Arbiters"
10:30 - 11:00 Coffee/tea
11:00 - 13:00 Session 9: Anonymity and Unlinkability
* Backes M., Doychev G., Duermuth M., Koepf B., "Speaker Recognition in Encrypted Voice Streams"
* Pashalidis A., Schiffner S., "Evaluating Adversarial Partitions"
* Ardagna C., Jajodia S., Samarati P., Stavrou A., "Providing Mobile Users' Anonymity in Hybrid Networks"
* Tiplea F.-L., Vamanu L., Varlan C., "Complexity of Anonymity for Security Protocols"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 10: Network Security and Economics
* Wang L., Jajodia S., Singhal A., Noel S., "k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks"
* Johnson B., Grossklags J., Christin N., Chuang J., "Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information"
* Backes M., Ciobotaru O., Krohmer A., "RatFish: A File Sharing Protocol Provably Secure Against Rational Users"
* Kheir N., Cuppens-Boulahia N., Cuppens F., Debar H., "A Comprehensive Approach for Cost-Sensitive Intrusion Response"
16:00 - 16:30 Coffee/tea
16:00 - 18:00 Session 11: Secure Update, DOS and Intrusion Detection
* Perito D., Tsudik G., "Secure Code Update for Embedded Devices via Proofs of Secure Erasure"
* Kapravelos A., Polakis I., Athanasopoulos E., Ioannidis S., Markatos E., "D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks"
* Karame G., Capkun S., "Low-Cost Client Puzzles based on Modular Exponentiation"
* Tokhtabayev A., Skormin V., Dolgikh A., "Expressive, Efficient and Obfuscation Resilient Behavior Based IDS"
18:00 Farewell
MORE INFORMATION
Additional information about the conference can be found at: www.esorics2010.org
--------------------------------------------------------------------- To unsubscribe, e-mail: computational.science-unsubscribe@lists.iccsa.org For additional commands, e-mail: computational.science-help@lists.iccsa.org