[crypto] [spock at cert.org: [fc-announce] FC07: Preliminary program and call for participation]

R. Hirschfeld ray at unipay.nl
Mon Jan 8 17:26:09 CET 2007


------- Start of forwarded message -------
Date: Mon, 8 Jan 2007 08:08:09 -0500 (EST)
From: Sven Dietrich <spock at cert.org>
To: fc-announce at ifca.ai
Subject: [fc-announce] FC07: Preliminary program and call for participation

Dear Colleague,

    Please see below for the preliminary program and call for participation for 
Financial Cryptography and Data Security 2007. Please note the upcoming hotel 
and registration deadlines.

See you in Tobago!

- -- 
Sven Dietrich - fc07chair at cert.org
Program Chair, Financial Cryptography and Data Security 2007
http://fc07.ifca.ai/



        Financial Cryptography and Data Security 2007 (FC07)
            PRELIMINARY PROGRAM & CALL FOR PARTICIPATION

                       Hilton Tobago Resort
                 Lowlands, Scarborough, Trinidad/Tobago
                        February 12-15, 2007

                        <http://fc07.ifca.ai/>

- ------------------------------------------
             Hotel & Registration
- ------------------------------------------

The FC07 Hotel Reservation Deadline is THIS MONDAY, January 8.
      <http://fc07.ifca.ai/accommodations.html>

Registration will open early next week.  The deadline for early
early registration rates is January 22.
      <http://fc07.ifca.ai/registration.html>


- ------------------------------------------
            Preliminary Program
- ------------------------------------------

All events take place at the Hilton Tobago Resort unless otherwise noted.

Sunday, February 11, 2007

5:00pm-7:00pm
Registration reception
poolside Hilton Tobago Resort
Monday, February 12, 2007

7:30am-8:30am
Breakfast and Registration

8:30am-8:45am
Welcome, Minister of Finance (tentative)

8:45am-9:00am
Conference opening, Conference Chairs

9:00am-10:00am
Keynote Address

Mike Bond

Title: Leaving Room for the Bad Guys

When designing a crypto protocol, or building a large security architecture, no 
competent designer ignores considering the bad guy, and anticipating his plans. 
But often we designers find ourselves striving to build totally secure systems 
and protocols -- in effect writing the bad guys entirely out of the equation. 
In a large system, when you exclude the bad guys, they soon muscle their way in 
elsewhere, and maybe in a new and worse way over which you may have much less 
control. A crypto protocol with no known weaknesses may be a strong tool, but 
when it does break, it will break in an unpredictable way.

This talk explores the hypothesis that it is safer and better for designers to 
give the bad guys their cut, but to keep it small, and keep in control. It may 
not just be our systems but also our protocol building blocks that should be 
designed to make room for the bad guy to take his cut. The talk is illustrated 
with examples of very successful systems with known weaknesses, drawn primarily 
from the European EMV payment system, and banking security in general. We also 
discuss a few "too secure" systems that end up failing in worse ways as a 
result.

10:00am-10:30am
Break

10:30am-12:00pm
Technical Paper Session
Payment Systems

Vulnerabilities in First-Generation RFID-enabled Credit Cards, Thomas S. 
Heydt-Benjamin (University of Massachusetts Amherst, USA), Daniel V. Bailey 
(RSA Laboratories, USA), Kevin Fu (University of Massachusetts Amherst, USA), 
Ari Juels (RSA Laboratories, USA), and Tom O'Hare (Innealta, Inc.)

Conditional E-Cash, Larry Shi and Bogdan Carbunar (Motorola Labs) and Radu Sion 
(Stony Brook University, USA)

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against 
Splitting, Liqun Chen (HP Laboratories), Alberto Escalante, Hans Loehr, Mark 
Manulis, and Ahmad-Reza Sadeghi (Horst Goertz Institute Bochum, Germany)

12:00pm-1:00pm
Lunch

1:00pm-2:30pm
Panel: RFID - yes or no, Moderator: TBD

2:30pm-3:00pm
Break

3:00pm-4:00pm
Technical Paper Session
Anonymity

A Model of Onion Routing with Provable Anonymity, Joan Feigenbaum (Yale 
University), Aaron Johnson (Yale University, USA), and Paul Syverson (Naval 
Research Laboratory, USA)

K-Anonymous Multi-party Secret Handshakes, Shouhuai Xu (UTSA) and Moti Yung 
(RSA Laboratories and Columbia University, USA)

4:00pm
Adjourn

6:00pm-9:00pm
Reception
Location: TBA



Tuesday, February 13, 2007

7:30am-9:00am
Breakfast

9:00am-10:30am
Technical Paper Session
Authentication

Using a Personal Device to Strengthen Password Authentication from an Untrusted 
Computer, Mohammad Mannan and Paul C. van Oorschot (Carleton University, 
Canada)

Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups, Yvo 
Desmedt (University College London, UK), Tanja Lange (Eindhoven University of 
Technology, Netherlands) and Mike Burmester (Florida State University, USA)

On Authentication with HMAC and Non-Random Properties, Christian Rechberger and 
Vincent Rijmen (Graz University of Technology, Austria)

10:30am-11:00am
Break

11:00am-12:00pm
Technical Paper Session
Anonymity and Privacy

Hidden Identity-Based Signatures, Aggelos Kiayias and Hong-Sheng Zhou 
(University of Connecticut, USA)

Space-Efficient Private Search, George Danezis and Claudia Diaz (K.U. 
Leuven, Belgium)

12:00pm
Adjourn - Box Lunches Available

8:00pm-9:00pm
IFCA General Meeting, Location: TBD

9:00pm-12:00am
Rump Session
Location: TBD



Wednesday, February 14, 2007

7:30am-9:00am
Breakfast

9:00am-10:30am
Technical Paper Session
Cryptography and Commercial Transactions

Cryptographic Securities Exchanges, Christopher Thorpe and David C. Parkes 
(Harvard University, USA)

Improved multi-party contract signing, Aybek Mukhamedov and Mark Ryan 
(University of Birmingham, UK)

Informant: Detecting Sybils Using Incentives, N. Boris Margolin and Brian Neil 
Levine (University of Massachusetts Amherst, USA)

10:30am-11:00am
Break

11:00am-12:00pm
Technical Paper Session
Financial Transactions & Web Services

Dynamic Virtual Credit Card Numbers, Ian Molloy (Purdue University, USA), 
Jiangtao Li (Intel Corporation) and Ninghui Li (Purdue University, USA)

The unbearable lightness of PIN cracking, Omer Berkman (The Academic College of 
Tel Aviv Yaffo, Israel) and Odelia Moshe Ostrovsky (Algorithmic Research Ltd. 
and Tel Aviv University, Israel)

12:00pm-1:00pm
Lunch


1:00pm-2:30pm
Panel: Virtual Economies - Threats and Risks, Moderator: Jean Camp

2:30pm-3:00pm
Sponsor Presentation: TBD

3:00pm
Adjourn

6:00pm-9:00pm
Beach BBQ
Location: TBA

10:00pm-??
Event (TBA)



Thursday, February 15, 2007

7:30am-9:00am
Breakfast

9:00am-10:00am
Invited Talk --- Dawn Jutla

Title: Usable SPACE: Security, Privacy, and Context for the Mobile User

Users breach the security of data within many financial applications daily as 
human and/or business expediency to access and use information wins over 
corporate security policy guidelines. Recognizing that changing user context 
often requires different security mechanisms, we discuss end-to-end solutions 
combining several security and context mechanisms for relevant security control 
and information presentation in various mobile user situations. We illustrate 
key concepts using Dimitri Kanevsky's (IBM Research) early 2000s patented 
inventions for voice security and classification.

10:00am-10:30am
Break

10:30am-11:00am
System paper session

The Motorola Personal Digital Right Manager, Siddharth Bhatt (Stony Brook 
University, USA), Carbunar Bogdan (Motorola Labs), Radu Sion (Stony Brook 
University, USA), and Venu Vasudevan (Motorola Labs)

11:00am-12:00pm
Technical Paper Session
Cryptography

Certificate Revocation using Fine Grained Certificate Space Partitioning, Vipul 
Goyal (UCLA, USA)

An Efficient Aggregate Shuffle Argument Scheme, Jun Furukawa (NEC Corporation, 
Japan) and Hideki Imai (National Institute of Advanced Industrial Science and 
Technology, Japan)

12:00pm-1:00pm
Conference closing/Lunch, Conference Chairs



_______________________________________________
fc-announce mailing list
fc-announce at ifca.ai
http://mail.ifca.ai/mailman/listinfo/fc-announce
------- End of forwarded message -------


More information about the crypto mailing list