The goal of this workshop is to generally promote work on security analysis of protocols and foster cooperative research combining the logical and complexity-based approaches. The workshop will include tutorials on the basics of each approach and will allow representatives from both communities to talk about their current work.
Topics
The workshop will be open for the public. If you'd like to give a presentation please send a title and abstract to the organizers as soon as possible. Also, we intend this to be a participatory and interactive meeting so we hope you will be able to contribute to the meeting even without giving an announced talk.
For more information, see: http://dimacs.rutgers.edu/Workshops/Protocols
Creating high-performance, highly scalable, and secure VANET technologies presents an extraordinary challenge to the wireless research community. Yet, certain limitations commonly assumed in ad hoc networks are mitigated in VANET. For example, VANET may marshal relatively large computational resources. Ample and recharging power sources can be assumed. Mobility patterns are constrained by road paths and driving speed restrictions. VANET represents high resource/performance wireless technology. As such, VANET can use significantly different approaches than sensor networks. VANET applications will include on-board active safety systems leveraging vehicle-vehicle or roadside-vehicle networking. These systems may assist drivers in avoiding collisions. Non-safety applications include real-time traffic congestion and routing information, high-speed tolling, mobile infotainment, and many others.
We invite papers from researchers on all aspects of vehicular ad hoc networks, such as new applications, networking protocols, security paradigms, network management technologies, power control, modulation, coding, channel modeling, etc. The session will bring together visionary researchers for an exciting exchange of ideas.
For more info, please see: http://www.path.berkeley.edu/vanet/
Coordination models, languages and middlewares, which advocate a distinct separation between the internal behaviour of the entities and their interaction, represent a promising approach. However, due to the openness of these systems, new critical aspects come into play, such as the need to deal with malicious components or with a hostile environment. Current research on network security issues (eg. secrecy, authentication, etc.) usually focuses on opening cryptographic point-to-point tunnels. Therefore, the proposed solutions in this area are not always exploitable to support the end-to-end secureinteraction between entities whose availability or location is not known beforehand.
Topics of interest include, but are not limited to:
Theoretical foundations, specification, analysis, case-studies, applications for authentication coordination models integrity web service technology privacy mobile ad-hoc networks confidentiality agent-based infrastructures access control -in- peer-to-peer systems denial of service global computing service availability context-aware computing safety aspects component-based systems fault tolerance ubiquitous/pervasive computingFor more information, please see: http://cs.unibo.it/secco04
In recent years, interest has increased in the field of security of parallel and distributed systems, which include the control mechanisms, mobile code security, denial-of-service attacks, trust management, modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis. We will focus our program on issues related to important properties of system security, such as measurability, sustainability, affordability, and usability in parallel and distributed systems.
Topics ofinterest include:
Topics of interest include (but are not limited to) the following:
Original research papers pertaining to all aspects of cryptography as well as tutorials are solicited. Submissions may present theory, techniques, applications and practical experience on topics including, but not limited to: fast implementations, secure electronic commerce, network security and intrusion detection, formal security models, comparison and assessment, tamper-resistance, certification and time-stamping, cryptographic data formats and standards, encryption and signature schemes, public-key infrastructure, protocols, elliptic-curve cryptography, cryptographic algorithm design and cryptanalysis, discrete logarithm and factorization techniques, lattice reduction, and provable security.
More information can be found at http://www.rsasecurity.com/rsalabs/cfp_ct_rsa05.html
A list of topics of interest along with other conference information can be found at www.acsac.org.
Anonymity Implementations Authentication Key Distribution Block Ciphers Operating Systems Security Complexity-based Cryptography Privacy Cryptanalysis Protocols Digital Signatures Public Key Encryption Hash Functions Secret Sharing Identification Survey and state of the artFor more information, please see http://www.dia.unisa.it/conferences/SCN04/
This minitrack focuses on security and survivability in networked computer systems. Of special interest are contributions that address survival, tolerance, recovery or masking of malicious attacks. Submissions will be sought from researchers in the area of system survivability, fault-tolerance and intrusion tolerance, software dependability, computer and network security, and economic or statistical modeling of secure/survivable systems.
Topics include, but are not limited to:
Original papers are solicited for submission to the workshop related (but not limited) to the following topics of interest:
The areas of interest include, but are not limited to:
. Internet & Wireless Security . Cyber Indication & Intrusion Detection . E-Commerce Protocols . Smart Cards & Secure Hardware . Access Control & Database Security . Mobile Security . Biometrics & Human Interface . Privacy & Anonymity . Network Security Protocols . Public Key Crypto Applications . Security & Trust Management . Threats & Information Warfare . Digital Rights Management . Virus Protection . Secure Software & Systems . Ubiquitous Computing Security . Information Hiding . Peer-to-Peer SecurityMore information can be found at http://dasan.sejong.ac.kr/~wisa04
Original papers and presentations on all aspects of financial and commerce security are invited. Submissions must have a visible bearing on financial and commerce security issues, but can be interdisciplinary in nature and need not be exclusively concerned with cryptography or security. Possible topics for submission to the various sessions include, but are not limited to:
Possible topics include, but are not limited to the following: