[FM-India] ISC 2011 - Call for Participation

sara.foresti at unimi.it sara.foresti at unimi.it
Sat Aug 20 20:15:48 IST 2011

[Apologies if you receive multiple copies of this message]


14th Information Security Conference (ISC 2011)
Xi'an, China -- 26-29 October, 2011


The 14th Information Security Conference (ISC 2011) will be held in
Xi'an, China. It will be sponsored by China Computer Federation
(CCF) and co-organized by Xidian University. The conference website
is http://ste.xidian.edu.cn/isc2011/. The Information Security
Conference (ISC) is an annual international conference covering
research in theory and applications of Information Security.
The conference will be a 3-day event featuring technical 
presentations of 25 technical papers. 
It also includes two keynote speeches.


Registration information is available at

Early registration fees apply until 15 September, 2011.


Wednesday, 26 October 2011 

16:00 - 20:00 Registration on Site

18:30 - 21:00 Welcome Reception 


Thursday, 27 October 2011

09:00 - 09:30 Opening/Photo

09:30 - 10:30 Keynote 1: Feng Bao [Session Chair: Xuejia Lai]

10:30 - 11:00 Coffee Break

11:00 - 12:30 ATTACKS

- Replacement Attacks on Behavior Based Software Birthmark
  (Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, 
   Bing Mao, and Li Xie)

- Attacking Traitor Tracing Schemes using History Recording 
  and Abrupt Decoders
  (Aggelos Kiayias and Serdar Pehlivanoglu)

- How to Find Short RC4 Colliding Key Pairs
  (Jiageng Chen and Atsuko Miyaji)

12:30 - 14:00 Lunch

14:00 - 15:30 PROTOCOLS

- A Formal Approach to Distance-Bounding RFID Protocols
  (Cristina Onete, Marc Fischlin, Michael Kasper, and 
   Ulrich Duerholz)

- MASHA - Low Cost Authentication with a New Stream Cipher
  (Shinsaku Kiyomoto, Matt Henricksen, Wun-She Yap, 
   Yuto Nakano, and Kazuhide Fukushima)

- Certificateless Authenticated Key Agreement Protocol 
  without Bilinear Pairings
  (Hu Xiong, Qianhong Wu, and Zhong Chen)

15:30 - 16:00 Coffee Break


- Security Analysis of an RSA Key Generation Algorithm with 
  a Large Private Key
  (Fanyu Kong, Jia Yu, and Lei Wu)

- Adaptive Secure-Channel Free Public-Key Encryption with 
  Keyword Search Implies Timed Release Encryption
  (Keita Emura, Atsuko Miyaji, and Kazumasa Omote)

- The n-Diffie-Hellman Problem and its Applications
  (Liqun Chen and Yu Chen)


Friday, 28 October 2011

09:00 - 10:00 NETWORK SECURITY    	

- RatBot: Anti-Enumeration Peer-to-Peer Botnets
  (Guanhua Yan, Songqing Chen, and Stephan Eidenbenz)

- Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
  (Ge Zhang and Simone Fischer-Huebner)

10:00 - 11:00 SOFTWARE SECURITY	

- Multi-Stage Binary Code Obfuscation Using Improved Virtual Machine
  (Hui Fang, Yong Dong Wu, Shuhong Wang, and Yin Huang)

- Detection and Analysis of Cryptographic Data inside Software
  (Ruoxu Zhao, Dawu Gu, Juanru Li, and Ran Yu)

11:00 - 11:30 Coffee Break

11:30 - 12:30 Keynote 2: Dieter Gollmann [Session Chair: Jianying Zhou]

12:30 - 14:00 Lunch

14:00 - 15:30 SYSTEM SECURITY

- SudoWeb: Minimizing Information Disclosure to Third Parties in 
  Single Sign-On Platforms
  (Georgios Kontaxis, Michalis Polychronakis, and Evangelos Markatos)

- Hello RootKitty: A Lightweight Invariance-Enforcing Framework
  (Francesco Gadaleta, Nick Nikiforakis, Yves Younan, 
   and Wouter Joosen)

- Opacity Analysis in Trust Management Systems
  (Moritz Y. Becker and Masoud Koleini)

15:30 - 16:00 Coffee Break

16:00 - 17:30 DATABASE SECURITY   	

- On the Inference-Proofness of Database Fragmentation 
  Satisfying Confidentiality Constraints
  (Joachim Biskup, Marcel Preuss, and Lena Wiese)

- Round-Efficient Oblivious Database Manipulation
  (Bingsheng Zhang, Sven Laur, and Jan Willemson)

- A Privacy-Preserving Join on Outsourced Database
  (Sha Ma, Bo Yang, Kangshun Li, and Feng Xia)

18:30 - 21:00 Conference Dinner/Best Paper Awards 


Saturday, 29 October 2011

09:00 - 10:30 PRIVACY   	

- APPA: Aggregate Privacy-Preserving Authentication in 
  Vehicular Ad Hoc Networks
  (Lei Zhang, Qianhong Wu, Bo Qin, and Josep Domingo-Ferrer)

- Assessing Location Privacy in Mobile Communication Networks
  (Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, 
   and Dirk von Suchodoletz. )

- How Much is Enough? Choosing epsilon for Differential Privacy
  (Jaewoo Lee and Chris Clifton)

10:30 - 11:00 Coffee Break


- Non-interactive CDH-Based Multisignature Scheme in the 
  Plain Public Key Model with Tighter Security
  (Yuan Zhou, Haifeng Qian, and Xiangxue Li)

- An Efficient Construction of Time-Selective Convertible 
  Undeniable Signature
  (Qiong Huang, Duncan S. Wong, Willy Susilo, and Bo Yang)

- Efficient Fail-Stop Signatures from the Factoring Assumption
  (Atefeh Mashatan and Khaled Ouafi)

12:30 - 13:30 Lunch

13:30 - 18:00 Tour to Terra-Cotta Warrior and Horses Museum 


Additional information about the conference can be found at

More information about the FMIndia mailing list