IEEE Cipher

 Conference Reports 

 

Issue E107.  March 20, 2012
       Review of the Financial Cryptography and Data Security, Feb 26-Mar 3, 2012,
       Bonaire, Dutch Antilles   by Benjamin Mood

Issue E103.  July 18, 2011
       Comments on the Security and Privacy Symposium, May 23-25, 2011,
       Berkeley/Oakland, CA   by Hilarie Orman

Issue E101.  March 15, 2011
       Review of Financial Cryptography, the Workshop Real-life Cryptographic protocols and Standardization, and the Workshop on Ethics in Computer Security Research, February 28-March 4, 2011,
       St. Lucia   by Omar Choudary

Issue E97.  July 25, 2010
       Review of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 8-9, 2010,
       Bonn, Germany   by
        Asia Slowinska and Johannes Hoffmann

       Review of the Web 2.0 Security and Privacy Workshop, May 20, 2010,
       Claremont Hotel, Berkeley, CA  
       by Sruthi Bandhavkavi

Issue E96.  May 31, 2010
       Review of the Security and Privacy Symposium, technical sessions, May 17-19, 2010,
       Berkeley/Oakland, California, USA   by
        Ben Ransford, University of Massachusetts Amherst
        Sruthi Bandhakavi, University of Illinois at Urbana-Champaign
        Joana Trindade, University of Illinois at Urbana-Champaign
       Review of the Security and Privacy Awards Banquet, May 17, 2010,
       Berkeley, California   by Hilarie Orman

Issue E95.  March 21, 2010
       Review of the Financial Cryptography, January 25-28, 2010,
       Tenerife, Canary Islands, Spain   by Vaibhav Garg and Debin Liu

       Review of the Workshop on Ethics in Computer Security Research, January 28-29, 2010,
       Tenerife, Canary Islands, Spain   by Vaibhav Garg and Debin Liu

Issue E92.  September 15, 2009
       Review of the ARO Workshop on Digital Forensics, September 10-11, 2009,
       Arlington, VA   by Yong Guan

Issue E91.  July 20, 2009
       Review of the Detection of Intrusions and Malware & Vulnerability Assessment, July 9-10, 2009,
       Como, Italy   by Review by Martin Apel and Michael Meier

Issue E90.  May 30, 2009
       Review of the Symposium on Security & Privacy, May 17-20, 2009,
       Claremont Hotel Resort and Spa, Berkeley, CA   by Martin Szydlowski

Issue E89.  March 16, 2009
       Review of the NIST SHA-3 Round One Conference, 2/25/09-2/28/09,
       KU, Leuven, Belguim   by Hilarie Orman and Richard Schroeppel

Issue E85.  July 19, 2008
       Review of the Computer Security Foundations Symposium, June 23-25, 2008,
       CMU, Pittsburgh, Pennsylvania, USA   by Kumar Avijit

Issue E84.  May 24, 2008
       Review of the Security and Privacy Symposium, May 19-22, 2008,
       Berkeley/Oakland, CA   by Matt Fredrikson

Issue E79.  July 19, 2007
       Review of the Security and Privacy Symposium 2007, May 20-23, 2007,
       Oakland/Berkeley, California   by Tom Hinke

Issue E76.  January 18, 2007
       Review of the New Security Paradigms Workshop, September 19-22, 2006,
       Schloss Dahstuhl, Germany   by Carol Taylor

       Review of the ACSAC, December 11-15, 2006,
       Miami, Florida   by Tom Haigh, Charlie Payne, and Jeremy Epstein

Issue E75.  November 20, 2006
       Review of the FloCon Workshop, October 10-12, 2006,
       Vancouver, WA   by Tim Shimeall

Issue E74.  September 18, 2006
       Review of the USENIX Security, 7/31 - 8/4/06,
       Vancouver, BC, Canada   by Jeremy Epstein

       Review of the Detection of Intrusions, Malware, and Vulnerability Assessment Conference (DIMVA) 2006, July 13-16, 2006,
       Berlin, Germany   by Sven Dietrich

Issue E73.  July 18, 2006
       Review of the IEEE Computer Society Security and Privacy Symposium, May 21 - May 24, 2006,
       Berkeley/Oakland, California, USA   by Ganesh Bhaskara and Justin Zhang

Issue E72.  May 26, 2006
       Review of Financial Cryptography 2006, February 27 - March 2, 2006,
       Anguilla, British West Indies   by Sven Dietrich

Issue E68.  September 19, 2005
       Review of SOUPS, Symposium on Usable Privacy and Security, July 6-8, 2005,
       CMU, Pittsburgh, PA   by Fahd Arshad and Rob Reeder

Issue E67.  July 18, 2005
       Review of the Workshop on Detection of Intrusions, Malware, and Vulnerability Assessment (DIMVA), July 7-8, 2005,
       Vienna, Austria   by Sven Dietrich

Issue E66.  May 17, 2005
       Review of the Finanical Cryptography Conference, February 28-March 3, 2005,
       Roseau, Dominica   by Allan Friedman

Issue E65.  March 18, 2005
       Review of the RSA Conference, February 14-18, 2005
       San Francisco, CA, USA   by Jeremy Epstein

Issue E64.  January 17, 2005
       Review of the 20th Annual Computer Security Applications Conference, December 6-10, 2004,
       Tucson, AZ   by Jeremy Epstein

Issue E61.  July 17, 2004
       Review of the 17th IEEE Computer Security Foundations Workshop, June 28-30, 2004,
       Asilomar, CA   by Jon Millen

Issue E60.  May 18, 2004
       Review of the Security and Privacy, May 10-12, 2004,
       Berkeley, California   by Hilarie Orman

Issue E58.  January 15, 2004
       Review of the 19th Annual Computer Security Applications Conference (ACSAC), December 8-12, 2003,
       Las Vegas, NV, USA   by Jeremy Epstein

Issue E56.  September 15, 2003
       Review of the IACR Crypto Conference
       Santa Barbara, CA, USA, August 17-21, 2003, by Richard Schroeppel

       Review of the USENIX Security Conference
       Washington, DC, USA, August 4-8, 2003, by Jeremey Epstein and Sven Dietrich

Issue E55.  August 1, 2003
       Review of the Computer Security Foundations Workshop,
       Asilomar, California, USA, June 29 - July 3, 2003, by Jon Millen

Issue E54.  June 7, 2003
       Review of the IEEE Privacy and Security Symposium,
       Berkeley, California, May 12-14, 2003, by Jason Holt and Hilarie Orman

Issue E53.  March 20, 2003
       Review of the Seventh International Financial Cryptography Conference,
       Gosier, Guadeloupe, January 27-30, 2003, by Jean Camp

       Review of the Australian Industry Group's workshop on "Threats to Australia's
       Security" , Melbourne, February 19, 2003,  by Vernon Stagg

Issue E51.  November 16, 2002
       Review of New Security Paradigms 2002 Workshop Papers, September 23-26, 2002,
       Virginia Beach, VA   by Christina Serban and Hilary Hosmer

Issue E48.  May 20, 2002
       Report on the 10th AIPIO conference,  November 2001,
       Queensland, Australia   by  Vernon Stagg

       Report on the 2nd Australian IW and CS Conference
       November 29-30, 2001, Perth, Australia   by  Vernon Stagg

Issue E45.  November 17, 2001
       Report on the 2001 New Security Paradigms Workshop (NSPW)
       September 10-13, 2001, Cloudcroft, New Mexico, USA,   by  Mary Ellen Zurko

Issue E44.  September 15, 2001
       Report on the 14th Computer Security Foundations Workshop
       (CSFW 2001) June 11-13, 2001, Nova Scotia, Canada,  by  Geraint Price

Issue E43.  July 11, 2001
       Report on the Workshop on Cryptographic Hardware and Embedded Systems
       (CHES 2001) May 14-16, 2001, Paris, France, by  Jonathan Towle

        Report on the 10th International World Wide Web Conference (WWW 10)
        May 1-5, 2001, Hong Kong,   by Mary Ellen Zurko
 

        Report on the 2001 IEEE Symposium on Security and Privacy (S&P 2001),
        May 13-16, 2001, Oakland, CA, USA,  by Mary Ellen Zurko
 

Issue E42.  May 1, 2001
       Report on the Fifth International Conference on Financial Cryptography
       (FC 2001), Grand Cayman, BWI, February 19-22, 2001, by L. Jean Camp

Issue E41.  February 20, 2001
       Report on WITS 2000, by Riccardo Focardi
       Report on NSPW 2000, by Brenda Timmerman

Issue E39.  October 12, 2000
       Report on CHES 2000, by Joe Marconis

Issue E38.  August 4, 2000
       Report on S&P 2000, by Hilarie Orman and Richard Schroeppel
       Report on FIRST'2000, by Cristina Serban       

Issue E37.  May 29, 2000
       Report on WWW9, by Mary Ellen Zurko
       Report on Eurocrypt by Richard Graveman
       Report on NDSS by Mahesh V. Tripunitara

Issue E36.  April 7, 2000
       Report on Financial Cryptography 2000 by Jonathan Byron 

Issue E35.  January 21, 2000
      
Report on ACSAC '99 by Mahesh V. Tripunitara  

Issue E34.  November 3, 1999
       Report on CRYPTO '99 by Richard F. Graveman
       Report on USENIX Security Symposium '99 by Kevin E. Fu
       Report on Selected Areas in Cryptography (SAC '99) by Serge Mister
       Report on New Security Paradigms Workshop (NSPW '99) by Mary Ellen Zurko

Issue E33.  August 12, 1999
       Report on Advanced Encryption Standard Candidate Conference (AES2)
            by Morris Dworkin
       Report on IEEE Computer Security Foundations Workshop (CSFW12) 
            by Scott Stoller
       Report on the Forum for Incident Response and Security Teams (FIRST 99)
            by Cristina Serban
       Program of the Formal Methods and Security Protocols Workshop (FMSP '99)
            with links to papers, etc.

Issue #32 June 07, 1999
       Report on Computers, Freedom, and Privacy Conference (CFP '99) by Danielle Gallo
       Report on the 1999 IEEE Security and Privacy Symposium by Mary Ellen Zurko

Issue #31 March 15, 1999
      
Report on the Network and Distributed System Security Symposium (NDSS 99)
              by Tatyana Ryutov
       Report on the 2nd Workshop on Research with Security Vulnerability Databases
              by Mahesh V. Tripunitara
       Report on Financial Cryptography (FC 99)
              by Ryan Lackey, Olin Sibert, and Alex van Someren

Issue #30 December 18, 1998
       Report on the First AES Candidate Conference
              by Edward Roback and Morris Dworkin
       Report on the Workshop on Security and Integrity of Data Intensive Applications,
              in conjunction with the 9th Int. Conf. on Database and Expert Systems Applications
              (DEXA'98) by T. Mandry, G. Pernul, T. Schlichting
       Report on the 5th ACM Conference on Computer and Communications Security

From Cipher EI #29 October 7, 1998

From Cipher EI #28 July 13, 1998

From Cipher EI #27 April 27, 1998

From Cipher EI #26 February 9, 1998

From Cipher EI #25 November 24, 1997

From Cipher EI #24, October 5, 1997

From Cipher EI #23, August 15, 1997

From Cipher EI #22, July 12, 1997

From Cipher EI #21, March 25, 1997

From Cipher EI #20, February 10, 1997

From Cipher EI #19, December 23, 1996

From Cipher EI #18, November 11, 1996

From Cipher EI #17, October 1, 1996

From Cipher EI #16, July 28, 1996

From Cipher EI #15, June 1, 1996

Commentary and Opinion

From Cipher EI #14, April 28, 1996

Commentary and Opinion

From Cipher EI #13, March 31, 1996

From Cipher EI #12, February 14, 1996

Commentary and Opinion

From Cipher EI #11, December 23, 1995

From Cipher EI #10, November 1, 1995

From Cipher EI #9, September 18, 1995

From Cipher EI #8, August 5, 1995