IEEE Cipher
Conference Reports
Issue E107. March 20, 2012
Review
of the Financial Cryptography and Data Security, Feb 26-Mar 3, 2012,
Bonaire, Dutch Antilles by Benjamin Mood
Issue E103. July 18, 2011
Comments
on the Security and Privacy Symposium,
May 23-25, 2011,
Berkeley/Oakland, CA by Hilarie Orman
Issue E101. March 15, 2011
Review
of Financial Cryptography, the Workshop Real-life Cryptographic protocols and Standardization, and the
Workshop on Ethics in Computer Security Research,
February 28-March 4, 2011,
St. Lucia by Omar Choudary
Issue E97. July 25, 2010
Review
of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 8-9, 2010,
Bonn, Germany by
Asia Slowinska and Johannes Hoffmann
Review
of the Web 2.0 Security and Privacy Workshop, May 20, 2010,
Claremont Hotel, Berkeley, CA
by Sruthi Bandhavkavi
Issue E96. May 31, 2010
Review
of the Security and Privacy Symposium, technical sessions, May 17-19, 2010,
Berkeley/Oakland, California, USA by
Ben Ransford, University of Massachusetts Amherst
Sruthi Bandhakavi, University of Illinois at Urbana-Champaign
Joana Trindade, University of Illinois at Urbana-Champaign
Review
of the Security and Privacy Awards Banquet, May 17, 2010,
Berkeley, California by Hilarie Orman
Issue E95. March 21, 2010
Review
of the Financial Cryptography, January 25-28, 2010,
Tenerife, Canary Islands, Spain by Vaibhav Garg and Debin Liu
Review
of the Workshop on Ethics in Computer Security Research, January 28-29, 2010,
Tenerife, Canary Islands, Spain by Vaibhav Garg and Debin Liu
Issue E92. September 15, 2009
Review
of the ARO Workshop on Digital Forensics, September 10-11, 2009,
Arlington, VA by Yong Guan
Issue E91. July 20, 2009
Review
of the Detection of Intrusions and Malware & Vulnerability Assessment, July 9-10, 2009,
Como, Italy by Review by Martin Apel and Michael Meier
Issue E90. May 30, 2009
Review
of the Symposium on Security & Privacy, May 17-20, 2009,
Claremont Hotel Resort and Spa, Berkeley, CA by Martin Szydlowski
Issue E89. March 16, 2009
Review
of the NIST SHA-3 Round One Conference, 2/25/09-2/28/09,
KU, Leuven, Belguim by Hilarie Orman and Richard Schroeppel
Issue E85. July 19, 2008
Review
of the Computer Security Foundations Symposium, June 23-25, 2008,
CMU, Pittsburgh, Pennsylvania, USA by Kumar Avijit
Issue E84. May 24, 2008
Review
of the Security and Privacy Symposium, May 19-22, 2008,
Berkeley/Oakland, CA by Matt Fredrikson
Issue E79. July 19, 2007
Review
of the Security and Privacy Symposium 2007, May 20-23, 2007,
Oakland/Berkeley, California by Tom Hinke
Issue E76. January 18, 2007
Review
of the New Security Paradigms Workshop, September 19-22, 2006,
Schloss Dahstuhl, Germany by Carol Taylor
Issue E75. November 20, 2006
Review
of the FloCon Workshop, October 10-12, 2006,
Vancouver, WA by Tim Shimeall
Issue E74. September 18, 2006
Review
of the USENIX Security, 7/31 - 8/4/06,
Vancouver, BC, Canada by Jeremy Epstein
Review
of the Detection of Intrusions, Malware, and Vulnerability Assessment Conference (DIMVA) 2006, July 13-16, 2006,
Berlin, Germany by Sven Dietrich
Issue E73. July 18, 2006
Review
of the IEEE Computer Society Security and Privacy Symposium, May 21 - May 24, 2006,
Berkeley/Oakland, California, USA by Ganesh Bhaskara and Justin Zhang
Issue E72. May 26, 2006
Review
of Financial Cryptography 2006, February 27 - March 2, 2006,
Anguilla, British West Indies by Sven Dietrich
Issue E68. September 19, 2005
Review
of SOUPS, Symposium on Usable Privacy and Security, July 6-8, 2005,
CMU, Pittsburgh, PA by Fahd Arshad and Rob Reeder
Issue E67. July 18, 2005
Review
of the Workshop on Detection of Intrusions, Malware, and Vulnerability Assessment (DIMVA), July 7-8, 2005,
Vienna, Austria by Sven Dietrich
Issue E66. May 17, 2005
Review
of the Finanical Cryptography Conference, February 28-March 3, 2005,
Roseau, Dominica by Allan Friedman
Issue E65. March 18, 2005
Review
of the RSA Conference, February 14-18, 2005
San Francisco, CA, USA by Jeremy Epstein
Issue E64. January 17, 2005
Review
of the 20th Annual Computer Security Applications Conference, December 6-10, 2004,
Tucson, AZ by Jeremy Epstein
Issue E61. July 17, 2004
Review
of the 17th IEEE Computer Security Foundations Workshop, June 28-30, 2004,
Asilomar, CA by Jon Millen
Issue E60. May 18, 2004
Review
of the Security and Privacy, May 10-12, 2004,
Berkeley, California by Hilarie Orman
Issue E58. January 15, 2004
Review
of the 19th Annual Computer Security Applications Conference (ACSAC), December 8-12, 2003,
Las Vegas, NV, USA by Jeremy Epstein
Issue E56. September 15, 2003
Review of the
IACR Crypto Conference
Santa Barbara, CA, USA, August 17-21, 2003, by Richard Schroeppel
Review of the
USENIX Security Conference
Washington, DC, USA, August 4-8, 2003, by Jeremey Epstein and Sven Dietrich
Issue E55. August 1, 2003
Review of the
Computer Security Foundations Workshop,
Asilomar, California, USA, June 29 - July 3, 2003, by Jon Millen
Issue E54. June 7, 2003
Review of the
IEEE Privacy and Security Symposium,
Berkeley, California, May 12-14, 2003, by Jason Holt and Hilarie Orman
Issue E53. March 20, 2003
Review of the Seventh International
Financial Cryptography Conference,
Gosier, Guadeloupe, January 27-30, 2003, by Jean Camp
Review of the
Australian Industry Group's workshop on
"Threats to Australia's
Security"
, Melbourne, February 19, 2003,
by Vernon Stagg
Issue E51. November 16, 2002
Review
of New Security Paradigms 2002 Workshop Papers, September 23-26, 2002,
Virginia Beach, VA by Christina Serban
and Hilary Hosmer
Issue
E48. May 20, 2002
Report on the
10th AIPIO conference, November 2001,
Queensland, Australia
by Vernon Stagg
Report on the
2nd Australian IW and CS Conference
November 29-30, 2001, Perth, Australia
by Vernon Stagg
Issue
E45. November 17, 2001
Report on the
2001 New Security Paradigms Workshop (NSPW)
September 10-13, 2001, Cloudcroft, New Mexico,
USA,
by Mary Ellen Zurko
Issue
E44. September 15, 2001
Report on the
14th Computer Security Foundations Workshop
(CSFW 2001) June 11-13, 2001, Nova Scotia, Canada,
by Geraint Price
Issue
E43. July 11, 2001
Report on the
Workshop on Cryptographic Hardware and Embedded Systems
(CHES 2001) May 14-16, 2001, Paris, France, by Jonathan Towle
Report on the 10th
International World Wide Web Conference (WWW 10)
May 1-5, 2001, Hong Kong, by Mary Ellen Zurko
Report on the 2001 IEEE
Symposium on Security and Privacy (S&P 2001),
May 13-16, 2001, Oakland, CA, USA, by Mary Ellen Zurko
Issue
E42. May 1, 2001
Issue
E41. February 20, 2001
Issue
E39. October 12, 2000
Issue
E38. August 4, 2000
Issue
E37. May 29, 2000
Issue E36. April 7, 2000
Issue E34. November 3, 1999
Issue E33. August 12, 1999
Issue #32 June 07, 1999
Issue #31 March 15, 1999
Issue #30 December 18, 1998
Report on the
Fifth International Conference on Financial Cryptography
(FC 2001), Grand Cayman, BWI, February 19-22, 2001, by L. Jean Camp
Report on WITS 2000,
by Riccardo Focardi
Report on
NSPW 2000, by Brenda Timmerman
Report on
CHES 2000,
by
Joe Marconis
Report on
S&P 2000,
by Hilarie Orman and Richard Schroeppel
Report on
FIRST'2000, by
Cristina Serban
Report on WWW9,
by Mary Ellen Zurko
Report on
Eurocrypt by Richard Graveman
Report on
NDSS by Mahesh V. Tripunitara
Report
on Financial Cryptography 2000 by Jonathan Byron
Report on ACSAC '99 by Mahesh V. Tripunitara
Report on CRYPTO '99 by Richard F. Graveman
Report on USENIX Security Symposium '99 by Kevin E. Fu
Report on Selected Areas in Cryptography (SAC '99) by Serge Mister
Report on New Security Paradigms Workshop (NSPW '99) by Mary Ellen Zurko
Report on Advanced Encryption Standard Candidate Conference (AES2)
by Morris Dworkin
Report on IEEE Computer Security Foundations Workshop (CSFW12)
by Scott Stoller
Report on the Forum for Incident
Response and Security Teams (FIRST 99)
by Cristina Serban
Program of the Formal Methods and Security Protocols Workshop (FMSP '99)
with links to papers, etc.
Report on Computers, Freedom, and Privacy Conference (CFP '99)
by Danielle Gallo
Report on the 1999 IEEE Security and Privacy Symposium by Mary Ellen Zurko
Report on the Network and Distributed System Security Symposium (NDSS 99)
by Tatyana Ryutov
Report on the 2nd Workshop on Research with Security Vulnerability
Databases
by Mahesh V. Tripunitara
Report on Financial Cryptography (FC 99)
by Ryan Lackey, Olin Sibert,
and Alex van Someren
Report on the First AES Candidate Conference
by Edward Roback and Morris Dworkin
Report on the Workshop on Security and Integrity of
Data Intensive Applications,
in conjunction with the 9th
Int. Conf. on Database and Expert Systems Applications
(DEXA'98) by T. Mandry, G. Pernul, T. Schlichting
Report on the 5th ACM Conference on Computer and Communications
Security
From Cipher EI #29 October 7, 1998
From Cipher EI #28 July 13, 1998
From Cipher EI #27 April 27, 1998
From Cipher EI #26 February 9, 1998
From Cipher EI #25 November 24, 1997
From Cipher EI #24, October 5, 1997
From Cipher EI #23, August 15, 1997
From Cipher EI #22, July 12, 1997
From Cipher EI #21, March 25, 1997
(A brief report from a survey) by Erland Jonsson and Lech Janczewski
From Cipher EI #20, February 10, 1997
From Cipher EI #19, December 23, 1996
From Cipher EI #18, November 11, 1996
From Cipher EI #17, October 1, 1996
From Cipher EI #16, July 28, 1996
From Cipher EI #15, June 1, 1996
Commentary and Opinion
From Cipher EI #14, April 28, 1996
Commentary and Opinion
30 Nov. - 1 Dec., 1995, Gaithersburg, MD,
by Ravi Sandhu [Note: Revised 30 April 1996]
From Cipher EI #13, March 31, 1996
Report on Internet Society
Symposium on Network and Distributed System Security, 22-23 February,
San Diego, by Christoph Schuba
From Cipher EI #12, February 14, 1996
Commentary and Opinion
From Cipher EI #11, December 23, 1995
From Cipher EI #10, November 1, 1995
From Cipher EI #9, September 18, 1995
From Cipher EI #8, August 5, 1995