Time Table
November 25, 2008
Time | Session |
---|---|
13:30–13:45 | Opening Ceremony |
13:45–15:30 | Cryptography |
15:30–16:00 | Coffee break |
16:00–17:45 | Signature and signcryption |
November 26, 2008
Time | Session | |
---|---|---|
09:30–11:50 | Software security | |
11:50–14:20 | Lunch | |
14:20–16:05 | Privacy protection and contents protection | |
16:05–16:30 | Coffee Break | |
16:30–17:30 | Invited Talk | |
18:00– | Conference Dinner |
November 27, 2008
Time | Session | |
---|---|---|
09:00–10:45 | Authentication and access control | |
10:45–11:15 | Coffee Break | |
11:15–12:25 | Implementation | |
Closing |
Program of IWSEC2008
Opening Ceremony
13:30-13:45 25 November (Tue), 2008
Session: Cryptography (13:45-15:30)
13:45-15:30 25 November (Tue), 2008
Session Chair: Tshuyoshi Takagi
- On generating elements of orders dividing $p^{2k}\pm p^k+1$,
Maciej Grze\'skowiak - Chosen Ciphertext Secure Public Key Encryption with a Simple Structure,
Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe - Remarks on the Attack of Fouque et al. against the $\ell$IC Scheme,
Naoki Ogura, Shigenori Uchiyama
Session: Signature and signcryption
16:00-17:45 25 November (Tue), 2008
Session Chair: Noboru Kunihiro
- Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles,
Fuchun Guo, Yi Mu and Zhide Chen - Signcryption Scheme In Multi-user Setting Without Random Oracles,
Chik How Tan - Simple and Efficient Group Signature Scheme assuming Tamperproof Devices,
Takuya Yoshida and Koji Okada
Session: Software security
09:30-11:50 26 November (Wed), 2008
Session Chair: Jigang Liu
- The Superdiversifier: Peephole Individualization for Software Protection,
Matthias Jacob, Mariusz Jakubowski, Prasad Naldurg, Chit Wei (Nick) Saw, Ramarathnam Venkatesan - Detecting Java Theft Based on Static API Trace Birthmark,
Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han - Online Network Forensics for Automatic Repair Validation,
Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis - Return Value Predictability Profiles for Self--Healing,
Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo
Session: Privacy protection and contents protection
14:20-16:05 26 November (Wed), 2008
Session Chair: Angelos Keromytis
- Involuntary Information Leakage in Social Network Services,
Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen - Privacy Preserving Computations without Public Key Cryptographic Operation,
Koji Chida and Katsumi Takahashi - A Novel Framework For Watermarking : The Data-Abstracted Approach,
Cyril BAZIN, Jean-Marie Le Bars, Jacques Madelaine
Session: Invited Talk
16:30-17:30 26 November (Wed), 2008
Session Chair: Kazuo Ota
- The Elliptic Curve Discrete Logarithm Problem: State of the Art,
Alfred Menezes
[Abstract]
Session: Authentication and access control
9:00-10:45 27 November (Thu), 2008
Session Chair: Hiroaki Kikuchi
- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication,
Julien Bringer and Herve Chabanne and David Pointcheval and Sebastien Zimmer - Analysis of a Biometric Authentication Protocol for Signature Creation Application,
Anongporn Salaiwarakul and Mark D. Ryan - Efficient Secure Labeling Method under Dynamic XML Data Streams,
Dong Chan An, So Mi Park, and Seog Park
Session: Implementation
11:15-12:25 27 November (Thu), 2008
Session Chair: Shoichi Hirose
- Bitstream Encryption and Authentication using AES-GCM in Dynamically Reconfigurable Systems,
Yohei Hori, Akashi Satoh, Hirofumi Sakane and Kenji Toda - The Long-Short-Key Primitive and Its Applications to Key Security,
Matthew Cary, Matthias Jacob, Mariusz Jakubowski, Ramarathnam Venkatesan