Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Contact: Guojun Wang (Mobile: 13360581866)
Advance Program at a Glance
The 12th International Conference on Information Security Practice and Experience
(ISPEC 2016)
Nov. 16-18, 2016
Zhangjiajie International Hotel
No. 145, Sanjiaoping, Yongding District, Zhangjiajie, Hunan Province, China
Nov. 15 14:00-18:00 Registration, Reception
Nov. 16
08:30-18:00 Opening, Photo Shooting, Keynote (1), Paper Presentation (11)
12:30-14:00 Lunch
18:30-20:30 Dinner
Nov. 17
08:30-17:30 Keynote (1), Paper Presentation (12)
12:30-14:00 Lunch
18:30-20:30 Banquet
Nov. 18 08:30-12:00 Huawei IoT Security Forum
12:00-14:00 Lunch
Sponsored by:
Organized by: Central South University, Guangzhou University, Jishou University
Contact: Guojun Wang (Mobile: 13360581866)
Advance Program
Venue
14:00-18:00 Nov. 15, 2016
Registration and Conference Kit Collection
18:30 – 20:30 Reception (Venue)
2016-11-16 (Day 1) (Venue)
8:30-9:00 Opening
Keynote 1: (Chair:)
9:00-10:00 Keynote speaker: Prof. David Basin
Security Protocols Fit for Humans
10:00-10:50 Photo Shooting + Coffee Break
Session 1: Privacy Preserving (Chair: )
10:50-11:15 A Privacy Preserving Source Verifiable Encryption Scheme
Zhongyuan Yao, Yi Mu and Guomin Yang
11:15-11:40 Privacy-preserving Mining of Association Rules for Horizontally Distributed Databases based on FP-tree Yaoan Jin
11:40-12:05 Privacy-preserving Cloud Auditing with Multiple Uploaders Ge Wu, Yi Mu, Willy Susilo and Fuchun Guo
12:05-12:30 Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol in Cloud Computing Jingguo Bi and Jiayang Liu
12:30-14:00: Lunch (Venue)
Session 2: Symmetric-key Cryptoanalysis (Chair: )
14:00-14:25 Structural Evaluation for Simon-like designs
Huiling Zhang and Wenling Wu
14:25-14:50 Cryptanalysis of Midori128 Using Impossible Differential Techniques Zhan Chen and Xiaoyun Wang
14:50-15:15 Collision Attacks on CAESAR Second-Round Candidate: ELmD Jian Zhang and Wenling Wu
15:15-15:40 Security of SM4 Against (Related-Key) Differential Analysis Jian Zhang and Wenling Wu
15:40-16:10: Coffee Break
Session 3: Tag and RFID security (Chair:)
16:10-16:35 Efficient Tag Path Authentication Protocol with Less Tag Memory
Hongbing Wang, Yingjiu Li, Zongyang Zhang and Yunlei Zhao
16:35-17:00 RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits Lukasz Krzywiecki, Przemysław Błaśkiewicz and Piotr Syga
17:00-17:25 Physical-layer Identification of HF RFID Cards Based on RF Fingerprinting
Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji
18:30-20:00: Dinner (Venue)
Contact: Guojun Wang (Mobile: 13360581866)
2016-11-17 (Day 2):Venue ()
Keynote 2: (Chair:)
8:30-9:30
Keynote speaker: Prof. David Naccache
Thrifty Zero-Knowledge: When Linear Programming Meets Cryptography Simon Cogliani, Houda Ferradi, Rémi Géraud, and David Naccache
Session 4: Finance security (Chair:)
9:30-9:55 Anonymizing Bitcoin Transaction
Dimaz Ankaa Wijaya, Ron Steinfeld, Joseph Liu, Shi-Feng Sun and Xinyi Huang
9:55-10:20 KopperCoin - A Distributed File Storage with Financial Incentives
Henning Kopp, Christoph Bösch and Frank Kargl
10:20-10:50: Coffee Break
Session 5: Security design (Chair:)
10:50-11:15 Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network
Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi and Jorge Cobb
11:15-11:40 Authenticated CAN Communications Using Standardized Cryptographic Techniques
Zhuo Wei, Yanjiang Yang and Tieyan Li
11:40-12:05 The Distribution of 2
n-Periodic Binary Sequences with Fixed k-Error Linear Complexity
Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu
12:05-12:30 Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU
Zhiniang Peng, Shaohua Tang, Ju Chen and Chen Wu
12:30-14:00: Lunch (Venue)
Session 6: Public key scheme (Chair: )
14:00-14:25 Practical Signature Scheme From Gamma-Protocol
Zhoujun Ma and Yunlei Zhao
14:25-14:50 A Formal Concept of Domain Pseudonymous Signatures
Lucjan Hanzlik, Kamil Kluczniak and Miroslaw Kutylowski
14:50-15:15 Homomorphically Encrypted Arithmetic Operations over the Integer Ring
Chen Xu, Jingwei Chen, Wenyuan Wu and Yong Feng
15:15-15:40: Coffee Break
Session 7: Detection & Monitoring (Chair:)
15:40-16:05 An Spark-Based DDoS attack detection model in cloud services
Jian Zhang, Yawei Zhang, Pin Liu and Jianbiao He
16:05-16:30 A Host-Based Detection Method of Remote Access Trojan in the Early Stage
Daichi Adachi and Kazumasa Omote
16:30-16:55
Masking Algorithm for Multiple Crosstalk Attack Source Identification under Greedy Sparse
Monitoring
H. W. Siew, S. C. Tan and C. K. Lee
18:30-20:30 Banquet (Venue)
Contact: Guojun Wang (Mobile: 13360581866)
2016-11-18 (Day 3):(Venue)
Invited Industrial Talks: Huawei IoT Security Forum
Session 8: Security Primitives for IoT (Chair: Prof. Robert Deng)
8:30-9:05 Let's Get Physical: Protocols for the Internet of Things
Prof. David Basin, ETH Zurich, Switzerland
9:05-9:40 Key Establishment for IoT Applications Prof. Yang Xiang, Deakin University, Australia
9:40-10:15 Privacy-Preserving Deep Learning in Cloud Computing and IoT
Prof. Jin Li, Guangzhou University, China
10:15-10:45 Coffee Break
Session 9: IoT Security Challenges (Chair: Prof. Robert Deng)
10:45-11:20 ARMv8 Shellcodes from ‘A’ to ‘Z’ David Naccache, ENS, France
11:20-11:55 IoT Security Overview from Industry: Threats, Challenges, and Key Technologies Speakers: Dr. Tieyan Li and Dr. Guilin Wang, Huawei International, Singapore.
11:55-12:25 Panel Discussion
12:25-12:30 Closing Remarks
12:30-14:00 Lunch (Venue)
Closing
Conference Wireless Internet Connection Tips
WLAN:
Username:
Password:
Contact: Guojun Wang (Mobile: 13360581866)