ACNS 2008 Program Schedule


Davis Auditorium (4th fl.), Schapiro Center for Physical Sciences Research (CEPSR), Columbia University, New York, NY 10027


Tuesday, June 3 2008

9:00 :: Registration

10:00 :: Opening Remarks

10:30 - 12:30 :: Session 1

On the Effectiveness of Internal Patch Dissemination against File-sharing Worms
Liang Xie, Hui Song and Sencun Zhu
Pennsylvania State University

Peeking Through The Cloud
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis and Niels Provos    
Johns Hopkins University and Google Inc

Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Frank Stajano, Dan Cvrcek and Matt Lewis    
Computer Laboratory, University of Cambridge

PPAA: Peer-to-Peer Anonymous Authentication
Patrick P. Tsang and Sean W. Smith    
Department of Computer Science, Dartmouth College

12:30 - 2:00 :: Lunch

2:00 - 3:00 :: Session 2 (Industrial Track)

Leap-of-Faith Security is Enough for Mobility
Janne Lindqvist and Miika Komu    
Helsinki University of Technology, Finland

TLS-Tandem: A Step Towards Highly Trusted Network Applications
Pascal Urien    
Telecom Paris Tech, France

On Probabilistic Secure Communication
Arpita Patra, Ashish Choudhary, Kannan Srinathan and C. Pandu Rangan    
IIT Madras, India

3:00 - 3:30 :: Coffee Break

3:30 - 5:00 :: Session 3

Generic Constructions of Stateful Public Key Encryption and Their Applications
Joonsang Baek, Jianying Zhou and Feng Bao    
Institute for Infocomm Research, Singapore

Traceable and Retrievable Identity-based Encryption
Man Ho Au (1), Qiong Huang (2), Joseph K. Liu (3), Willy Susilo (1), Duncan S. Wong (2) and Guomin Yang (2)    
(1) University of Wollongong, (2) City University of Hong Kong and (3) Institute for Infocomm Research, Singapore

Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Takashi Nishide, Kazuki Yoneyama and Kazuo Ohta    
The University of Electro-Communications, Hitachisoft

Wednesday, June 4 2008

9:00 - 10:30 :: Session 4

Attacking Reduced Round SHA-256
Somitra Kumar Sanadhya and Palash Sarkar    
Indian Statistical Institute, Kolkata, India

Dakota -- hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Ivan B. Damg{\aa}rd and Lars R. Knudsen and S{\o}ren S. Thomsen    

Getting the Best Out of Existing Hash Functions or What if We Are Stuck with SHA?
Yevgeniy Dodis and Prashant Puniya    

10:30 - 11:00 :: Coffee Break

11:00 - 12:30 :: Session 5

Replay Attack in a Fair Exchange Protocol
Macią Mut-Puigserver and Magdalena Payeras-Capellą and Josep Lluķs    
Ferrer-Gomila and Llorenē Huguet-Rotger Universitat de les Illes Balears

Improved Conditional E-Payments
Marina Blanton    
University of Notre Dame

Anonymity in Transferable E-cash
Sebastien Canard and Aline Gouget    
Orange Labs R&D and Gemalto Contact

12:30 - 2:00 :: Lunch

2:00 - 3:00 :: Session 6 :: INVITED TALK 1

Getting Serious About Key Derivation Functions
Speaker: Hugo Krawzcyk
IBM Research, Watson Research Center

3:00 - 3:30 :: Coffee Break

3:30 - 5:00 :: Session 7

Generic Security-Amplifying Methods of Ordinary Digital Signatures
Jin Li, Kwangjo Kim, Fangguo Zhang and Duncan Wong    
International Research center for Information Security (IRIS), Information and Communications University(ICU), Korea; Department of Electronics and Communication Engineering, Sun Yat-Sen University, China; Department of Computer Science, City University of Hong Kong, Hong Kong, China

New Differential Attacks on Rainbow-like Multivariate Signature and Improved Designs
Jintai Ding and Bo-Yin Yang    
University Cincinnati and Academia Sinica

Trapdoor Sanitizable Signatures and their Application to Content Protection
Sebastien Canard, Fabien Laguillaumie and Michel Milhau    
Orange Labs R&D, Universite de Caen and Orange Labs R&D

Thursday, June 5 2008

9:00 - 10:30 :: Session 8

Multi-Factor Authenticated Key Exchange
David Pointcheval and Sebastien Zimmer    
ENS/CNRS/INRIA, Paris, France

Repelling Detour Attack against Onions with Re-Encryption
Marek Klonowski, Miroslaw Kutylowski and Anna Lauks    
Institute of Mathematics and Computer Science, Wroclaw University of Technology

Analysis of EAP-GPSK Authentication Protocol
John C. Mitchell, Arnab Roy, Paul Rowe and Andre Scedrov    
Stanford University and University of Pennsylvania

10:30 - 11:00 :: Coffee Break

11:00 - 12:30 :: Session 9

Efficient Device Pairing using "Human-Comparable" Synchronized Audiovisual Patterns
Ramnath Prasad and Nitesh Saxena    
Polytechnic University

PUF-HB: A Tamper-Resilient HB based Authentication Protocol
Ghaith Hammouri and Berk Sunar    
Worcester Polytechnic Institute

An authentication scheme based on the twisted conjugacy problem
Vladimir Shpilrain and Alexander Ushakov    
The City College of New York and Stevens Institute of Technology

12:30 - 2:00 :: Lunch

2:00 - 3:00 :: Session 10 :: Invited Talk 2

Elliptic Curves and Cryptography: a 23 year perspective
Speaker: Victor Miller
Center for Communication Research, Princeton, NJ

3:00 - 3:30 :: Coffee Break

3:30 - 5:00 :: Session 11

Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Nikita Borisov and Soumyadeb Mitra    
University of Illinois at Urbana-Champaign and Data Domain

A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation
Tong-Lee Lim, A. Lakshminarayanan and Vira Saksen    
Institute for Infocomm Research, Singapore

On the Security of the CCM Encryption Mode and of a Slight Variant
Pierre-Alain Fouque Gwenaėlle Martinet, Frederic Valette and Sebastien Zimmer    

Friday, June 6 2008

9:00 - 10:00 :: Session 12

wNAF*, an efficient left-to-right signed digit recoding algorithm
Brian King    
Indiana University - Purdue University Indianapolis

A Very Compact "Perfectly Masked" S-Box for AES
D. Canright and Lejla Batina    
Naval Postgraduate School, USA and K.U. Leuven ESAT/COSIC, Belgium

10:00 - 11:00 :: Session 13 :: Invited Talk 3

Insider Threat Detection: Host and Network Monitoring Techniques
Speaker: Sal Stolfo
Columbia University

11:00 - 11:30 :: Coffee Break

11:30 - 1:00 :: Session 14

Pushback for Overlay Networks: Protecting against Malicious Insiders
Angelos Stavrou, Michael E. Locasto and Angelos D. Keromytis    
George Mason University, Dartmouth College and Columbia University

Traceable Privacy of Recent RFID Authentication Protocols
Khaled Ouafi and Raphael C.-W. Phan    
EPFL and Loughborough University

The security of EPC Gen2 compliant RFID protocols
Mike Burmester and Breno deMedeiros    
Florida State University and Google Inc.