Thursday, January 1, 2015

dmanet Digest, Vol 83, Issue 1

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. PODC 2015 Final Call for Workshop Proposals (Jukka Suomela)
2. InfoSec 2015: registration deadline 3 January (GRLMC)


----------------------------------------------------------------------

Message: 1
Date: Wed, 31 Dec 2014 00:55:24 +0200
From: Jukka Suomela <jukka.suomela@aalto.fi>
To: <DMANET@zpr.uni-koeln.de>
Subject: [DMANET] PODC 2015 Final Call for Workshop Proposals
Message-ID: <54A32D5C.8090601@aalto.fi>
Content-Type: text/plain; charset="utf-8"; format=flowed

-----------------------------------------------------------------------
PODC 2015 Final Call for Workshop Proposals
-----------------------------------------------------------------------

34th Annual ACM Symposium on Principles of Distributed Computing
July 21-23, 2015
Donostia-San Sebastian, Spain
http://www.podc.org/

-----------------------------------------------------------------------

The 34th Annual ACM SIGACT-SIGOPS Symposium on Principles of
Distributed Computing (PODC 2015) invites proposals for up to 1.5 day
workshops that are closely related to the current scope of the
conference or are new emerging research fields complementing or
extending it, including but not restricted to:

- algorithms for distributed systems and their complexity
- cluster, cloud, grid and high-performance computing
- communication networks: protocols, architectures, services,
applications
- sensor, mobile, ad-hoc, robot and peer-to-peer networks
- concurrent programming, synchronization, shared and transactional
memory
- cryptographic protocols and system security
- distributed operating systems, databases and programming languages
- dynamic, adaptive and machine learning based distributed algorithms
- self-stabilizing, self-organizing and autonomic systems
- formal methods, semantics and verification of concurrent systems
- fault tolerance, reliability, availability of distributed systems
- game-theoretic approaches to distributed computing
- information theory, codes and reliable communication
- Internet applications, social networks and complex networks
- multiprocessor and multi-core architectures and algorithms
- nanonetworks and biological distributed algorithms
- quantum and optics based distributed algorithms
- energy issues of parallel and distributed algorithms

Workshops will be held in conjunction with PODC on Monday 20 July 2015,
or, in exceptional cases, after the main PODC conference program.
Interested members of the community are invited to send proposals for
workshops by email to the workshop chair:

Elad Michael Schiller <elad@chalmers.se>

The following are required in a workshop proposal:

- Title of the workshop;

- An abstract describing the main focus of the workshop and why it
would be of interest to the PODC community;

- Names and contact information of the organizers;

- Estimated number of submitted and accepted papers, duration of the
workshop, and a brief description of the review process.

Although PODC will provide organizational and administrative support
for the co-located workshops, they must be prepared to bear their own
expenses (e.g., those associated with the meeting rooms and catering).
The budget of PODC and the workshops could be integrated in case of
ACM-based workshops, but the details will need to be worked out.

The proposals should be submitted to the workshop chair as soon as
possible, but no later than

January 6, 2015.

Notification of acceptance will be sent shortly after the deadline.

-----------------------------------------------------------------------


------------------------------

Message: 2
Date: Wed, 31 Dec 2014 13:02:25 +0100
From: "GRLMC" <grlmc@urv.cat>
To: <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] InfoSec 2015: registration deadline 3 January
Message-ID: <7FFA19AF99FD4DADAB6B81F1922B2EB5@Carlos1>
Content-Type: text/plain; charset="iso-8859-1"

**********************************************************************

INTERNATIONAL SUMMER SCHOOL ON INFORMATION SECURITY

InfoSec 2015

Tarragona, Spain

July 6-10, 2015

Organized by
Rovira i Virgili University

http://grammars.grlmc.com/InfoSec2015/

**********************************************************************

--- Early registration deadline: January 3, 2015 ---

**********************************************************************

AIM:

InfoSec 2015 will be a major research training event addressed to graduates
and postgraduates in the first steps of their academic career. With a global
scope, it aims at updating them about the most recent advances in the
critical and fast developing area of information security, which covers a
large spectrum of current exciting academic research and industrial
innovation. It refers to procedures to defend information from unauthorized
access, use, modification, recording or destruction, with a critical role to
play in order to avoid or minimize risks in the digital world. Renowned
academics and industry pioneers will lecture and share their views with the
audience.

Most information security subareas will be displayed, namely: computer
security, cryptography, privacy, cyber security, mobile security, network
security, world wide web security, fraud prevention, data protection, etc.
Main challenges of information security will be identified through 4 keynote
lectures, 33 six-hour courses, and 1 round table, which will tackle the most
active and promising topics. The organizers believe outstanding speakers
will attract the brightest and most motivated students. Interaction will be
a main component of the event.

ADDRESSED TO:

Graduates and postgraduates from around the world. There are no formal
pre-requisites in terms of academic degrees. However, since there will be
differences in the course levels, specific background knowledge may be
required for some of them.

InfoSec 2015 is also appropriate for more senior people who want to keep
themselves updated on recent developments and future trends. They will
surely find it fruitful to listen and discuss with major researchers,
industry leaders and innovators.

REGIME:

In addition to keynotes, 4 courses will run in parallel during the whole
event. Participants will be able to freely choose the courses they will be
willing to attend as well as to move from one to another.

VENUE:

InfoSec 2015 will take place in Tarragona, located 90 kms. to the south of
Barcelona. The venue will be:

Campus Catalunya
Universitat Rovira i Virgili
Av. Catalunya, 35
43002 Tarragona

KEYNOTE SPEAKERS:

Jan Camenisch (IBM Research, Zurich), Privacy in a Digital World: a Lost
Cause?

Hao Chen (University of California, Davis), (In)security of Mobile Apps in
Untrusted Networks

Jennifer Seberry (University of Wollongong), The Global Village: the
Beginning of the Need for Computer Security [via videoconference]

Gene Tsudik (University of California, Irvine), Off-line Proximity-based
Social Networking

PROFESSORS AND COURSES:

N. Asokan (Aalto University), [intermediate] Mobile Security: Overview of
Hardware Platform Security and Considerations of Usability

Jan Camenisch (IBM Research, Zurich), [introductory/intermediate]
Technologies to Protect Online Privacy

Hao Chen (University of California, Davis), [intermediate/advanced] Security
of the Mobile App Ecosystem

Nicolas T. Courtois (University College London), [introductory/intermediate]
Security of ECDSA in Bitcoin and Crypto Currency

Claude Cr?peau (McGill University, Montr?al), [introductory/intermediate]
Quantum Computation, Cryptography and Cryptanalysis

Joan Daemen (ST Microelectronics Belgium, Diegem),
[introductory/intermediate] Sponge Functions, Keccak and SHA-3

Sajal K. Das (Missouri University of Science and Technology, Rolla),
[intermediate/advanced] Securing Cyber-Physical Systems: Challenges and
Opportunities

Herv? Debar (T?l?com SudParis), [introductory/intermediate] Detection and
Reaction to Attacks: from Intrusion Detection to Cyber-Defense

Yevgeniy Dodis (New York University), [intermediate/advanced] Randomness in
Cryptography

David Evans (University of Virginia, Charlottesville),
[introductory/intermediate] Secure Multiparty Computation: Techniques,
Theory, and Tools for Building Privacy-Preserving Applications

Rosario Gennaro (City University of New York), [intermediate/advanced] A
Survey of Verifiable Delegation of Computation

Trent Jaeger (Pennsylvania State University, University Park),
[intermediate/advanced] How to Add Security Enforcement to Legacy Programs

Markus Jakobsson (Qualcomm, Santa Clara), [introductory/intermediate]
Frontiers in Fraud Prevention

Antoine Joux (Pierre et Marie Curie University, Paris),
[introductory/intermediate] Discrete Logarithms in Finite Fields

Marc Joye (Technicolor R&I, Los Altos), [introductory/intermediate] Secure
Public-Key Cryptosystems

Somesh Jha (University of Wisconsin, Madison), [intermediate/advanced]
Analysis Techniques in Information Security

Lars R. Knudsen (Technical University of Denmark, Lyngby),
[introductory/intermediate] Block Ciphers: the Workhorses in Cryptography

Songwu Lu (University of California, Los Angeles),
[introductory/intermediate] Cellular Network Security: Issues and Defenses

Catherine Meadows (Naval Research Laboratory, Washington DC),
[introductory/intermediate] Formal Analysis of Cryptographic Protocols

Nasir Memon (New York University), [introductory/intermediate] User
Authentication

Ethan L. Miller (University of California, Santa Cruz),
[intermediate/advanced] Securing Stored Data in a Connected World

Stefano Paraboschi (University of Bergamo), [introductory/intermediate] Data
Protection in Network-enabled Systems

Bart Preneel (KU Leuven), [introductory/intermediate] Cryptology: State of
the Art and Research Challenges

Jean-Jacques Quisquater (Catholic University of Louvain),
[introductory/intermediate] The History of RSA: from Babylon to Smart Cards

Shantanu Rane (Palo Alto Research Center), [introductory/intermediate]
Privacy-preserving Data Analytics: Problems, Solutions and Challenges

Mark Ryan (University of Birmingham), [introductory/intermediate] Designing
Security Protocols: Electronic Voting, and Electronic Mail

Rei Safavi-Naini (University of Calgary), [introductory]
Information-theoretic Security

Stefan Saroiu (Microsoft Research, Redmond), [advanced] Dealing with Loss:
Protecting Data on a Lost Mobile Device

Milind Tambe (University of Southern California, Los Angeles),
[introductory/intermediate] Introduction to the Emerging Science of Security
Games

Gene Tsudik (University of California, Irvine), [intermediate/advanced]
Security and Privacy in Candidate Future Internet Architectures

Yang Xiao (University of Alabama, Tuscaloosa), [introductory/advanced]
Security in Smart Grids

Wenyuan Xu (University of South Carolina, Columbia), [intermediate] Security
and Privacy Analysis of Embedded Systems

Yuliang Zheng (University of North Carolina, Charlotte), [introductory]
Cryptography and the Future of Money

ORGANIZING COMMITTEE:

Adrian Horia Dediu (Tarragona)
Carlos Mart?n-Vide (Tarragona, chair)
Florentina Lilica Voicu (Tarragona)

REGISTRATION:

The registration form can be found at:

http://grammars.grlmc.com/InfoSec2015/registration.php

The selection of up to 8 courses requested in the registration template is
only tentative and non-binding. For the sake of organization, it will be
helpful to have an approximation of the respective demand for each course.

Since the capacity of the venue is limited, registration requests will be
processed on a first come first served basis. The registration period will
be closed and the on-line registration facility disabled when the capacity
of the venue will be complete. It is much recommended to register prior to
the event.

FEES:

Fees are a flat rate covering the attendance to all courses during the week.
There are several early registration deadlines. Fees depend on the
registration deadline.

ACCOMMODATION:

Suggestions of accommodation will be provided in due time.

CERTIFICATE:

Participants will be delivered a certificate of attendance.

QUESTIONS AND FURTHER INFORMATION:

florentinalilica.voicu@urv.cat

POSTAL ADDRESS:

InfoSec 2015
Lilica Voicu
Rovira i Virgili University
Av. Catalunya, 35
43002 Tarragona, Spain

Phone: +34 977 559 543
Fax: +34 977 558 386

ACKNOWLEDGEMENTS:

Universitat Rovira i Virgili




------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 83, Issue 1
*************************************

No comments:

Post a Comment