Program ISC 2012, Passau/Germany, Sept. 19 – 21, 2012

Click here for a PDF version of the program.

Wednesday, Sept. 19, 2012

08:15 – 09:15:                    Registration

09:15 – 09:30:                    Welcome
                                                     J. Posegga, D. Gollmann

09:30 – 10:30 :                   Invited Paper

                                                     Applied Research in Information Security: Challenges and Opportunities
                                                     M. Waidner

10:30 – 11:00:                    Coffee Break

11:00 – 12:30:                    Cryptography and Cryptanalysis

                                                    Differential Attacks on Reduced RIPEMD-160
                                                     F. Mendel, T. Nad, S. Scherz, M. Schläffer

                                                     Revisiting Difficulty Notions For Client Puzzles and DoS Resilience
                                                     B. Groza, B. Warinschi

                                                     On Optimal Bounds of Small Inverse Problems and Approximate GCD
                                                     Problems with Higher Degree
                                                     N. Kunihiro

12:30 – 14:00:                    Lunch

14:00 – 15:15:                    Mobility

                                                     Strong Authentication with Mobile Phone
                                                     S. Suoranta, A. Andrade, T. Aura

                                                     Measuring SSL Indicators on Mobile Browsers: Extended Life or End of the Road?
                                                     C. Amrutkar, P. Traynor, P. van Oorschot

                                                     Short Paper: Security and Privacy for WLAN Roaming over Hops with per-connection Tariff Negotiation
                                                     J. Barnickel, U. Meyer                                                    

15:15 – 15:45:                    Coffee Break

15:45 – 17:15:                    Cards and Sensors

                                                     Domain-Specific Pseudonymous Signatures for the German Identity Card
                                                     J. Bender, Ö. Dagdelen, M. Fischlin, D. Kügler

                                                     Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-constrained Platforms
                                                     F. Strenzke

                                                     100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks
                                                     S. Bag, A. Dhar, P. Sarkar

17:30 :                               Welcome Reception

                 

Thursday, Sept. 20, 2012

08:30 – 09:00:                    Registration

09:00 – 10:30:                    Software Security

                                                     Learning Fine-Grained Structured Input for Memory Corruption
                                                     Detection
                                                     L. Zhao, D. Gao, L. Wang

                                                     Dynamic Anomaly Detection for More Trustworthy Outsourced
                                                     Computation
                                                     S. Alsouri, J. Sinschek, A. Sewe, E. Bodden, M. Mezini, S. Katzenbeisser

                                                     An Empirical Study of Dangerous Behaviors in Firefox Extensions
                                                     J.G. Wang, X. Li, X. Liu, J.J. Wang, Z. Liang, B. Raj, Z. Feng

10:30 -  11:00:                    Coffee Break

11:00 – 12:30:                    Processing Encrypted Data

                                                     Collaboration-Preserving Authenticated Encryption for Operational
                                                     Transformation Systems
                                                     M. Clear, K. Reid, D. Ennis, A. Hughes, H. Tewari

                                                     Selective Document Retrieval from Encrypted Database
                                                     C. Bösch, Q. Tang, P. Hartel, W. Jonker

                                                     Additively Homomorphic Encryption with a Double Decryption
                                                     Mechanism, Revisited
                                                     A. Peter, M. Kronberg, W. Trei, S. Katzenbeisser

12:30 – 14:00:                    Lunch

14:00 – 15:15:                    Authentication and Identification

                                                     Secure Hierarchical Identity-Based Identification without Random Oracles
                                                     A. Fujioka, T. Saito, K. Xagawa

                                                     Efficient Two-Move Blind Signatures in the Common Reference String Model
                                                     E. Ghadafi, N.P. Smart

                                                     Short Paper: No Integrity, thanks – Verifiable Explicit Consented Undecidability of Integrity
                                                     H.C. Pöhls

15:15 – 15:45:                    Coffee Break

15:45 – 17:15:                    New Directions in Access Control

                                                     Compliance Checking for usage-Constrained Credentials in Trust Negotiation Systems
                                                     J. Hu, K. Khan, Y. Bai, Y. Zhang

                                                     A Quantitive Approach for Inexact Enforcement of Security Policies
                                                     P. Drábik, F. Martinelli, C. Morisset

                                                     OSDM: An Organizational Supervised Delegation Model for RBAC
                                                     N. Nassr, N. Aboudagga, E. Steegmans

19:30:                                                      Gala Dinner

 

Friday, Sept. 21, 2012

09:30 – 10:30:                    Invited Paper
                                                     Privacy-preserving Speaker Authentication
                                                     M. Pathak, J. Portelo, B. Raj, I. Trancoso

10:30 – 11:00:                    Coffee Break

11:00 – 12:00:                    GPU for Security

                                                     GPU-acceleration of block ciphers in the Open SSL Cryptographic library
                                                     J. Gilger, J. Barnickel, U. Meyer

                                                     A Highly-Efficient Memory-Compression Approach for GPU-Accelerated
                                                     Virus Signature Matching
                                                     C. Pungila, V. Negru

12:00 – 13:00:                    Models for Risk and Revocation

                                                     Intended Actions: Risk is Conflicting Incentives
                                                     L. Rajbhandari, E. Snekkenes

                                                     On the self-similarity nature of the revocation data
                                                     C. Gañán, J. Mata-Díaz, J.L. Muñoz, O. Esparza, J. Alins

13:00 – 13:15:                    Wrap-up and Farewell
                                                     J. Posegga, D. Gollmann, F. Freiling