Hace unos dias atras se publico la realizacion del evento "10th Information Security Conference" el cual se realizo en Valparaíso - Chile.
Para los que les gusta estar al tanto de los temas que se tocan en este tipo de eventos le informamos que ya se puede descargar algunas de las presentaciones utilizadas.
- Intrusion Detection. Chair: Javier Lopez
- Detecting System Emulators - Thomas Raffetseder, Christopher Kruegel, and Engin Kirda (Technical University of Vienna, Austria)
- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based - Intrusion Detection Systems - Iosif-Viorel Onut and Ali A. Ghorbani (University of New Brunswick, Canada)
- E-NIPS: An Event-Based Network Intrusion Prediction System- Pradeep Kannadiga, Mohammad Zulkernine and Anwar Haque (Queen's University, Canada) - Digital Rights Management. Chair: Stuart Haber
- Enabling Fairer Digital Rights Management with Trusted Computing. Ahmad-Reza Sadeghi (Ruhr-University Bochum, Germany), Marko Wolf (Ruhr-University Bochum, Germany), Christian Stueble (Sirrix AG Security Technologies, Germany), N. Asokan (Nokia Research Center, Finland), and Jan-Erik Ekberg (Nokia Research Center, Finland)
- Traitor Tracing with Optimal Transmission Rate. Nelly Fazio (IBM Almaden Research Center, USA), Antonio Nicolosi (NYU and Stanford University, USA), and Duong Hieu Phan (France Telecom R&D, France) - Invited TalkChair: Rene Peralta
- Speaker: Hugo Krawczyk (IBM T. J. Watson Research Center, USA). Strengthening Digital Signatures via Randomized Hashing" - Symmetric-Key Cryptography. Chair:Kaisa Nyberg
- The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Debra L. Cook (Alcatel-Lucent Bell Labs), Moti Yung and Angelos Keromytis (Columbia University)
- Impossible-Differential Attacks on large-block Rijndael. Jorge Nakahara Jr and Ivan Carlos Pavão (Catholic University of Santos, Brazil)
- High-Speed Pipelined Hardware Architecture for Galois Counter Mode. Akashi Satoh (National Institute of Advanced Industrial Science and Technology, Japan), Takeshi Sugawara and Takafumi Aoki (Tohoku University, Japan) - Panel on Cryptographic Hash Functions. Moderator: William Burr (NIST)Panelists:
William Burr (NIST - moderator). Stuart Haber (HP Labs)
Hugo Krawczyk (IBM T.J. Watson Research Center)
Rene Peralta (NIST)
Akashi Satoh (National Institute of Advanced Industrial Science and Technology, Japan)
NIST- Hash Funtion Completition - Cryptographic Protocols and Schemes. Chair: Alejandro Hevia
- Efficient Committed Oblivious Transfer of Bit StringsMehmet Kiraz, Berry Schoenmakers, José Villegas (TU Eindhoven, The Netherlands)
- An Efficient Certified Email Protocol. Jun Shao (Shanghai Jiao Tong University, China), Min Feng (Microsoft Research Asia), Bin Zhu (Microsoft Research Asia), and Zhenfu Cao (Shanghai Jiao Tong University, China)
- Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability. Alexander Dent and Qiang Tang(Royal Holloway, United Kingdom)
- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. Fabien Laguillaumie (Université de Caen, France) and Damien Vergnaud (Bonn/Aachen International Center for Information Technology, Germany) - Cryptanalysis. Chair: Debbie Cook
- Small Private-Exponent Attack on RSA with Primes Sharing Bits. Yao-Dong Zhao and Wen-Feng Qi (Zhengzhou Information Engineering University, China)
- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. Joo Yeon Cho and Josef Pieprzyk (Macquarie University, Australia)
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Gautham Sekar, Souradyuti Paul and Bart Preneel (Katholieke Universiteit Leuven, Belgium) - Network Security. Chair: Angelos Keromytis
- Queue Management as a DoS counter-measure. Daniel Boteanu, José M. Fernandez (École Polytechnique de Montréal, Canada) John McHugh (Dalhousie University, Canada), and John Mullins (École Polytechnique de Montréal, Canada) - Software Obfuscation. Chair: Angelos Keromytis
- On the Concept of Software Obfuscation in Computer Security. Nikolay Kuzurin, Alexander Shokurov (Institute for System Programming, Moscow) and Nikolay Varnovsky, Vladimir Zakharov (Moscow State University, Russia)
- Specifying Imperative Data Obfuscations. Stephen Drape, Clark Thomborson and Anirban Majumdar (The University of Auckland, New Zealand)
No hay comentarios:
Publicar un comentario