5
ContactGuojun Wang (Mobile: 13360581866) Advance Program at a Glance The 12th International Conference on Information Security Practice and Experience (ISPEC 2016) Nov. 16-18, 2016 Zhangjiajie International Hotel No. 145, Sanjiaoping, Yongding District, Zhangjiajie, Hunan Province, China Nov. 15 14:00-18:00 Registration, Reception Nov. 16 08:30-18:00 Opening, Photo Shooting, Keynote (1), Paper Presentation (11) 12:30-14:00 Lunch 18:30-20:30 Dinner Nov. 17 08:30-17:30 Keynote (1), Paper Presentation (12) 12:30-14:00 Lunch 18:30-20:30 Banquet Nov. 18 08:30-12:00 Huawei IoT Security Forum 12:00-14:00 Lunch Sponsored by: Organized by: Central South University, Guangzhou University, Jishou University

Advance Program at a Glance - Central South Universitytrust.csu.edu.cn/conference/ispec2016/AdvanceProgram.pdf · Advance Program at a Glance The 12th International Conference on

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Advance Program at a Glance - Central South Universitytrust.csu.edu.cn/conference/ispec2016/AdvanceProgram.pdf · Advance Program at a Glance The 12th International Conference on

Contact: Guojun Wang (Mobile: 13360581866)

Advance Program at a Glance

The 12th International Conference on Information Security Practice and Experience

(ISPEC 2016)

Nov. 16-18, 2016

Zhangjiajie International Hotel

No. 145, Sanjiaoping, Yongding District, Zhangjiajie, Hunan Province, China

Nov. 15 14:00-18:00 Registration, Reception

Nov. 16

08:30-18:00 Opening, Photo Shooting, Keynote (1), Paper Presentation (11)

12:30-14:00 Lunch

18:30-20:30 Dinner

Nov. 17

08:30-17:30 Keynote (1), Paper Presentation (12)

12:30-14:00 Lunch

18:30-20:30 Banquet

Nov. 18 08:30-12:00 Huawei IoT Security Forum

12:00-14:00 Lunch

Sponsored by:

Organized by: Central South University, Guangzhou University, Jishou University

Page 2: Advance Program at a Glance - Central South Universitytrust.csu.edu.cn/conference/ispec2016/AdvanceProgram.pdf · Advance Program at a Glance The 12th International Conference on

Contact: Guojun Wang (Mobile: 13360581866)

Advance Program

Venue

14:00-18:00 Nov. 15, 2016

Registration and Conference Kit Collection

18:30 – 20:30 Reception (Venue)

2016-11-16 (Day 1) (Venue)

8:30-9:00 Opening

Keynote 1: (Chair:)

9:00-10:00 Keynote speaker: Prof. David Basin

Security Protocols Fit for Humans

10:00-10:50 Photo Shooting + Coffee Break

Session 1: Privacy Preserving (Chair: )

10:50-11:15 A Privacy Preserving Source Verifiable Encryption Scheme

Zhongyuan Yao, Yi Mu and Guomin Yang

11:15-11:40 Privacy-preserving Mining of Association Rules for Horizontally Distributed Databases based on FP-tree Yaoan Jin

11:40-12:05 Privacy-preserving Cloud Auditing with Multiple Uploaders Ge Wu, Yi Mu, Willy Susilo and Fuchun Guo

12:05-12:30 Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol in Cloud Computing Jingguo Bi and Jiayang Liu

12:30-14:00: Lunch (Venue)

Session 2: Symmetric-key Cryptoanalysis (Chair: )

14:00-14:25 Structural Evaluation for Simon-like designs

Huiling Zhang and Wenling Wu

14:25-14:50 Cryptanalysis of Midori128 Using Impossible Differential Techniques Zhan Chen and Xiaoyun Wang

14:50-15:15 Collision Attacks on CAESAR Second-Round Candidate: ELmD Jian Zhang and Wenling Wu

15:15-15:40 Security of SM4 Against (Related-Key) Differential Analysis Jian Zhang and Wenling Wu

15:40-16:10: Coffee Break

Session 3: Tag and RFID security (Chair:)

16:10-16:35 Efficient Tag Path Authentication Protocol with Less Tag Memory

Hongbing Wang, Yingjiu Li, Zongyang Zhang and Yunlei Zhao

16:35-17:00 RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits Lukasz Krzywiecki, Przemysław Błaśkiewicz and Piotr Syga

17:00-17:25 Physical-layer Identification of HF RFID Cards Based on RF Fingerprinting

Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji

18:30-20:00: Dinner (Venue)

Page 3: Advance Program at a Glance - Central South Universitytrust.csu.edu.cn/conference/ispec2016/AdvanceProgram.pdf · Advance Program at a Glance The 12th International Conference on

Contact: Guojun Wang (Mobile: 13360581866)

2016-11-17 (Day 2):Venue ()

Keynote 2: (Chair:)

8:30-9:30

Keynote speaker: Prof. David Naccache

Thrifty Zero-Knowledge: When Linear Programming Meets Cryptography Simon Cogliani, Houda Ferradi, Rémi Géraud, and David Naccache

Session 4: Finance security (Chair:)

9:30-9:55 Anonymizing Bitcoin Transaction

Dimaz Ankaa Wijaya, Ron Steinfeld, Joseph Liu, Shi-Feng Sun and Xinyi Huang

9:55-10:20 KopperCoin - A Distributed File Storage with Financial Incentives

Henning Kopp, Christoph Bösch and Frank Kargl

10:20-10:50: Coffee Break

Session 5: Security design (Chair:)

10:50-11:15 Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network

Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi and Jorge Cobb

11:15-11:40 Authenticated CAN Communications Using Standardized Cryptographic Techniques

Zhuo Wei, Yanjiang Yang and Tieyan Li

11:40-12:05 The Distribution of 2

n-Periodic Binary Sequences with Fixed k-Error Linear Complexity

Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu

12:05-12:30 Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU

Zhiniang Peng, Shaohua Tang, Ju Chen and Chen Wu

12:30-14:00: Lunch (Venue)

Session 6: Public key scheme (Chair: )

14:00-14:25 Practical Signature Scheme From Gamma-Protocol

Zhoujun Ma and Yunlei Zhao

14:25-14:50 A Formal Concept of Domain Pseudonymous Signatures

Lucjan Hanzlik, Kamil Kluczniak and Miroslaw Kutylowski

14:50-15:15 Homomorphically Encrypted Arithmetic Operations over the Integer Ring

Chen Xu, Jingwei Chen, Wenyuan Wu and Yong Feng

15:15-15:40: Coffee Break

Session 7: Detection & Monitoring (Chair:)

15:40-16:05 An Spark-Based DDoS attack detection model in cloud services

Jian Zhang, Yawei Zhang, Pin Liu and Jianbiao He

16:05-16:30 A Host-Based Detection Method of Remote Access Trojan in the Early Stage

Daichi Adachi and Kazumasa Omote

16:30-16:55

Masking Algorithm for Multiple Crosstalk Attack Source Identification under Greedy Sparse

Monitoring

H. W. Siew, S. C. Tan and C. K. Lee

18:30-20:30 Banquet (Venue)

Page 4: Advance Program at a Glance - Central South Universitytrust.csu.edu.cn/conference/ispec2016/AdvanceProgram.pdf · Advance Program at a Glance The 12th International Conference on

Contact: Guojun Wang (Mobile: 13360581866)

2016-11-18 (Day 3):(Venue)

Invited Industrial Talks: Huawei IoT Security Forum

Session 8: Security Primitives for IoT (Chair: Prof. Robert Deng)

8:30-9:05 Let's Get Physical: Protocols for the Internet of Things

Prof. David Basin, ETH Zurich, Switzerland

9:05-9:40 Key Establishment for IoT Applications Prof. Yang Xiang, Deakin University, Australia

9:40-10:15 Privacy-Preserving Deep Learning in Cloud Computing and IoT

Prof. Jin Li, Guangzhou University, China

10:15-10:45 Coffee Break

Session 9: IoT Security Challenges (Chair: Prof. Robert Deng)

10:45-11:20 ARMv8 Shellcodes from ‘A’ to ‘Z’ David Naccache, ENS, France

11:20-11:55 IoT Security Overview from Industry: Threats, Challenges, and Key Technologies Speakers: Dr. Tieyan Li and Dr. Guilin Wang, Huawei International, Singapore.

11:55-12:25 Panel Discussion

12:25-12:30 Closing Remarks

12:30-14:00 Lunch (Venue)

Closing

Conference Wireless Internet Connection Tips

WLAN:

Username:

Password:

Page 5: Advance Program at a Glance - Central South Universitytrust.csu.edu.cn/conference/ispec2016/AdvanceProgram.pdf · Advance Program at a Glance The 12th International Conference on

Contact: Guojun Wang (Mobile: 13360581866)