1997-01-24 - 4th ACM Conference on Computer and Communications Security

Header Data

From: Mike Reiter <reiter@research.att.com>
To: reiter@research.att.com
Message Hash: 39f5fd77206f9f281782fc1f6dd533ee9157ad770d506d60f59d2e07793ab524
Message ID: <199701240642.WAA12224@toad.com>
Reply To: N/A
UTC Datetime: 1997-01-24 06:42:46 UTC
Raw Date: Thu, 23 Jan 1997 22:42:46 -0800 (PST)

Raw message

From: Mike Reiter <reiter@research.att.com>
Date: Thu, 23 Jan 1997 22:42:46 -0800 (PST)
To: reiter@research.att.com
Subject: 4th ACM Conference on Computer and Communications Security
Message-ID: <199701240642.WAA12224@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


	

        *** EARLY REGISTRATION DISCOUNT ENDS JANUARY 31 ***



    Fourth ACM Conference on Computer and Communications Security
               (Preliminary Technical Program)
                     Zurich, Switzerland
                      April 1-4, 1997
                   Sponsored by ACM SIGSAC


For more information, including registration and hotel information,
see: http://www.zurich.ibm.ch/pub/Other/ACMsec/index.html


================
TUESDAY, APRIL 1
================

4 half-day tutorials in two parallel tracks:

		Theory Track			Practice Track

Morning     Cryptography		CERT and Practical Network Security
            Jim Massey, Ueli Maurer	Tom Longstaff
	    (ETH Zurich)		(Software Engineering Institute)

				lunch

Afternoon   Internet Security		Info-Wars
	    Refik Molva			Paul Karger
	    (Eurecom)			(IBM TJ Watson)

==================
WEDNESDAY, APRIL 2
==================

09:00-09:30 Introduction and Opening Comments
			Richard Graveman (Bellcore)
			Phil Janson (IBM Zurich Lab)
			Li Gong (JavaSoft)
			Clifford Neuman (Univ. of Southern California)

09:30-10:30 Invited talk 1: To Be Announced

10:30-11:00 Coffee Break

11:00-12:00 Session 1: Fair Exchange of Information
			Chair: Philippe Janson (IBM Zurich Lab)

* Fair Exchange with a Semi-Trusted Third Party
  Matthew Franklin, Mike Reiter (AT&T Research)

* Optimistic Protocols for Fair Exchange
  N. Asokan, Matthias Schunter, Michael Waidner
	(IBM Zurich Lab and Univ. Dortmund)

12:00-14:00 Lunch

14:00-15:30 Session 2: Language and System Security
			Chair: Michael Waidner (IBM Zurich Lab)

* Static Typing with Dynamic Linking
  Drew Dean (Princeton University)

* Secure Digital Names
  Scott Stornetta, Stuart Haber (Surety Technologies)

* A Calculus for Cryptographic Protocols: The Spi Calculus
  Martin Abadi, Andrew D. Gordon (DEC SRC and Cambridge)

15:30-16:00 Coffee Break

16:00-17:30 Panel 1: Programming Languages as a Basis for Security
			Chair: Drew Dean (Princeton)
			Panelists: To Be Announced

Welcome Cocktail

=================
THURSDAY, APRIL 3
=================

09:00-10:30 Session 3: Authentication
			Chair: Ravi Sandhu (George Mason Univ.)

* Authentication via Keystroke Dynamics
  Fabian Monrose, Avi Rubin (New York Univ. and Bellcore)

* Path Independence for Authentication in Large-Scale Systems
  Mike Reiter, Stuart Stubblebine (AT&T Research)

* Proactive Password Checking with Decision Trees
  Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
	(Univ. of Turin)

10:30-11:00 Coffee Break

11:00-12:00 Invited talk 2: To Be Announced

12:00-14:00 Lunch

14:00-15:30 Session 4: Signatures and Escrow
			Chair: Martin Abadi (DEC SRC)

* Verifiable Partial Key Escrow
  Mihir Bellare, Shafi Goldwasser (UC San Diego and MIT)

* New Blind Signatures Equivalent to Factorisation
  David Pointcheval, Jacques Stern (ENS/DMI, France)

* Proactive Public-Key and Signature Schemes
  Markus Jakobsson, Stanislaw Jarecki, Amir Herzberg,
	Hugo Krawczyk, Moti Yung (UC San Diego, MIT, IBM Haifa Lab,
	IBM TJ Watson, and Bankers Trust)

15:30-16:00 Coffee Break
 
16:00-17:30 Panel 2: Persistance and Longevity of Digital Signatures
			Chair: Gene Tsudik (USC/ISI)
			Panelists: To Be Announced

Banquet Dinner

===============
FRIDAY, APRIL 4
===============

09:00-10:30 Session 5: Commerce and Commercial Security
			Chair: Jacques Stern (ENS/DMI, France)

* A New On-Line Cash Check Scheme
  Robert H. Deng, Yongfei Han, Albert B. Jeng,
	Teow-Hin Ngair (National University of Singapore)

* Conditional Purchase Orders
  John Kelsey, Bruce Schneier (Counterpane Systems)

* The Specification and Implementation of 'Commercial' Security
	Requirements including Dynamic Segregation of Duties
  Simon Foley (University College, Cork, Ireland)

10:30-11:00 Coffee Break

11:00-12:30 Session 6: Cryptography
			Chair: Mike Reiter (AT&T Research)

* On the Importance of Securing Your Bins:
	The Garbage-Man-in-the-Middle Attack
  Marc Joye, Jean-Jacques Quisquater (Univ. Louvain)

* Improved Security Bounds for Pseudorandom Permutations
  Jacques Patarin (Bull)

* Asymmetric Fingerprinting for Larger Collusions
  Birgit Pfitzmann, Michael Waidner
	(Univ. Hildesheim and IBM Zurich Lab)

12:30 Conference Adjourns







Thread