Monday, October 8, 2012

[DMANET] FPS 2012: Final Call for Participation, Montreal, Canada, October 25-26

[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION

*************************************************************************
5th International Symposium on Foundations & Practice of Security
Montreal, Canada -- October 25-26, 2012
http://conferences.telecom-bretagne.eu/fps2012/
*************************************************************************

OVERVIEW
The Foundations & Practice of Security (FPS) Symposium started as a
Franco-Canadian meeting sponsored by MITACS, INRIA and Institut
Mines-Telecom, and has since 2011 grown to be an international event
on its own. This fifth edition will be held in Montreal (Canada), the
25th and 26th of October of 2012. The objective of the FPS symposium
is to present and discuss international research in different areas of
theoretical and practical security solutions.

The program of this year is organized as a 2-day event featuring two
keynote speakers and more than 20 regular presentations that will
include research work on Security on Social networks, Intrusion
detection, Wireless Network Security, Privacy and Trust, Policy-based
Security Architectures, Cryptography and Cryptanalysis, Security of
Mobile Applications, Testing Techniques for Security Validation, and
Information Theoretic Security.

Visit http://conferences.telecom-bretagne.eu/fps2012/ for further
information.

=====================================================================
REGISTRATION
Registration information is available at:
http://conferences.telecom-bretagne.eu/fps2012/registration.html
=====================================================================

=====================================================================
TENTATIVE
PROGRAM=====================================================================

Thursday, October 25

8.15am - 8.45am Registration

8.45am - 9.00am Welcome and Opening Remarks

9.00am - 10.00am Invited Lecture
- A coding theory approach to unconditionally secure
proof-of-retrievability schemes for cloud storage, By Douglas Stinson
(University of Waterloo, Canada)


10.00am - 10.30am Coffee Break

10.30am - 12:15pm Session 1: Cryptography and Attack Modeling

- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data
Encryption, By Li and Jianliang Zheng
- Proofs of Retrievability via Fountain, By Sumanta Sarkar and
Reihaneh Safavi-Naini
- MARC: Modified ARC4, By Jianliang Zheng and Jie Li
- Detection of HTTP-GET Attack with Clustering and Information
Theoretic Measurements, By Pawel Chwalinski, Roman Belavkin and
Xiaochun Cheng
- Towards Modelling Adaptive Attacker's Behaviour, By Leanid
Krautsevich, Fabio Martinelli and Artsiom Yautsiukhin (Short Paper)

12.15pm - 1.45pm Lunch

1.45pm - 3.00pm Session 2: Key Management and Cryptographic Protocols

- A Generic Algebraic Model for the Analysis of Cryptographic-Key
Assignment Schemes, By Khair Eddin Sabri and Ridha Khedri
- Message Transmission and Key Establishment: Conditions for Equality
of Weak and Strong Capacities, By Hadi Ahmadi and Reihaneh
Safavi-Naini
- COMPASS: Authenticated Group Key Agreement from Signcryption, By
Nicholas Mailloux, Ali Miri and Monica Nevins
- Scalable Deniable Group Key Establishment, By Kashi Neupane, Rainer
Steinwandt and Adriana Suarez Corona (Short Paper)

3.00pm - 3.30pm Coffee Break

3.30pm - 4.30pm Session 3: Privacy and Trust

- A Formal Derivation of Composite Trust, By Tim Muller and Patrick
Schweitzer
- IPv6 Stateless Address Autoconfiguration: Balancing Between
Security, Privacy and Usability, By Ahmad Alsa'deh, Hosnieh Rafiee
and Christoph Meinel
- Information-theoretic foundations of differential privacy, By
Darakhshan J. Mir (Short Paper)

7.30pm - 10.30pm Banquet

=====================================================================

Friday, October 26

9.00am - 10.00am Invited Lecture
- How to use testing techniques for security validation, By Ana Rosa
Cavalli (TELECOM & Management SudParis, France)

10.00am - 10.30am Coffee Break

10.30am - 12:15pm Session 4: Policies and Application Security

- Policy Administration in Tag-Based Authorization, By Sandro Etalle,
Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato and Nicola
Zannone
- Enabling dynamic security policy in the Java security manager, By
Fabien Autrel, Nora Cuppens-Boulahia and Frederic Cuppens
- A Novel Obfuscation: Class Hierarchy Flattening, By Christophe
Foket, Bart Coppens, Koen De Bosschere and Bjorn De Sutter
- RESource: A Framework for Online Matching of Assembly with Open
Source Code, By Ashkan Rahimian, Philippe Charland, Stere Preda and
Mourad Debbabi
- Touchjacking Attacks on Web in Android, iOS, and Windows Phone, By
Tongbo Luo, Xing Jin, Ajai Ananthanarayanan and Wenliang Du

12.15pm - 1.45pm Lunch

1.45pm - 3.00pm Session 5: Network Security I

- GHUMVEE: efficient, effective and flexible replication, By Stijn
Volckaert, Bjorn De Sutter, Tim De Baets and Koen De Bosschere
- Extracting Attack Scenarios Using Intrusion Semantics, By Sherif
Saad and Issa Traore
- Classifying Online Social Network Users Through the Social Graph, By
Cristina Perez-Sola and Jordi Herrera-Joancomarti
- On Securely Manipulating XML Data, By Houari Mahfoud and Abdessamade
Imine

3.00pm - 3.30pm Coffee Break

3.30pm - 4.50pm Session 6: Network Security II

- Short-term Linkable Group Signatures with Categorized Batch
Verification, By Lukas Malina, Jordi Castella-Roca, Arnau
Vives-Guasch and Jan Hajny
- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs, By
Tahsin Reza and Michel Barbeau
- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad
Hoc Networks, By Isaac Woungang, Sanjay Kumar Dhurandher, Rajender
Dheeraj Peddi and Issa Traore
- A Case Study of Side-Channel Analysis using Decoupling Capacitor
Power Measurement with the OpenADC, Colin O'Flynn and Zhizhang Chen

4.50pm - 5.00pm Farewell
=====================================================================
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************