PROGRAM
On Dec 18, the registration counter will open at 08:00hrs, and on all other days it will open at 09:00hrs.
Please note that all talks in the regular session will be 30 minutes including a question and answer period, while each short paper talk will be 15 minutes.
Tuesday, December 16, 2008 |
10:00 - 13:00 | Tutorial I: Secure Multiparty Computation Dr. Kannan Srinathan, International Institute of Information Technology, India |
13:00 - 14:00 | Lunch |
14:00 - 17:00 | Tutorial II: Symbolic verification of cryptographic protocols: theoretical issues Dr. S. P. Suresh, Chennai Mathematical Institute, India |
Wednesday, December 17, 2008 |
10:00 - 13:00 | Tutorial III: Security Issues and Challenges in Wireless Networks Dr. Bezawada Bruhadeshwar & Dr. Kishore Kothapalli, International Institute of Information Technology, India |
13:00 - 14:00 | Lunch |
14:00 - 17:00 | Tutorial IV: Biometric Technologies & Applications Dr. Stephen J. Elliott & Dr. Shimon K. Modi, Purdue University, USA |
Thursday, December 18, 2008 |
8:45 - 10:00 | Opening remarks |
10:00 - 10:30 | Break |
10:30 - 11:30 | Keynote: BitBlaze: Binary-Analysis for Computer Security Dawn Song, University of California, Berkeley |
11:30 - 13:00 | Session I: Languages and Formal Methods
On the Decidability of Model-Checking Information Flow Properties
Deepak D'Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra Kagalavadi Ramesh and Barbara Sprick.
Synthesizing Enforcement Monitors wrt. the Safety-Progress Properties
Ylies Falcone, Jean-Claude Fernandez and Laurent Mounier.
Implicit Flows: Can't Live With 'Em, Can't Live Without 'Em
Dave King, Boniface Hicks, Michael Hicks and Trent Jaeger.
|
13:00 - 14:30 | Lunch |
14:30 - 16:00 | Session II: Protocols
A Robust Reputation Scheme for Decentralized Group Management Systems
Frederic Cuppens, Nora Cuppens-Boulahia and Julien A. Thomas
Complexity of Checking Freshness of Cryptographic Protocols
Zhiyao Liang and Rakesh Verma.
Secure Internet Voting Based on Paper Ballots
Lukasz Nitschke.
|
16:00 - 16:30 | Break |
16:30 - 18:00 | Session III: Biometrics, Forensics and Steganography
Indexing Biometric Databases Using Kd-tree with Feature Level Fusion
Umarani Jayaraman, Surya Prakash and Phalguni Gupta.
Audio Watermarking based on Quantization in Wavelet Domain
Vivekananda Bhat K, Indranil Sengupta and Abhijit Das.
Overwriting Hard Drive Data: The Great Wiping Controversy
Craig Wright, Dave Kleiman and Shyaam Sundhar R.S..
|
18:00 Onwards | Cultural Program |
Friday, December 19, 2008 |
10:00 - 11:00 | Keynote: Computing on Encrypted Data Amit Sahai, University of California, Los Angeles |
11:00 - 11:30 | Break |
11:30 - 12:30 | Session IV: Short papers
A Secure Round-based Timestamping Scheme with Absolute Timestamps
Duc-Phong Le, alban gabillon and Bonnecaze Alexis.
A Framework for Trustworthy Service-Oriented Computing
Sasikanth Avancha.
Revisiting Bluetooth Security
Manik Lal Das and Ravi Mukkamala.
A Verification Framework for Temporal RBAC with Role Hierarchy
Samrat Mondal and Shamik Sural.
|
12:30 - 12:50 | Session V: Ongoing Research
Cryptographically Strong and Weak Pseuorandom Bit Generators
Neelam Verma, Prasanna R Mishra and Gireesh Pandey.
Proxy Re-signature Schemes
Sunitha and Bharat B. Amberker.
|
12:50 - 14:15 | Lunch |
14:15 - 15:15 | Keynote: Basant Rajan, Symantec (India) |
15:15 -15:45 | Break |
15:45 - 17:45 | Industry Session |
18:00 - 19:00 | Business meeting |
19:00 Onwards | Banquet |
Saturday, December 20, 2008 |
10:00 - 11:00 | Keynote: Efficient Signature Matching with Extended Automata Somesh Jha, University of Wisconsin |
11:00 - 11:30 | Break |
11:30 - 13:00 | Session VI: Intrusion Detection
Real-Time Alert Correlation with Type Graphs
Gianni Tedesco and Uwe Aickelin.
Incorporation of Application Layer Protocol Syntax into Anomaly Detection
Patrick Duessel, Christian Gehl, Pavel Laskov and Konrad Rieck.
A Parallel Architecture for Stateful, High-Speed Intrusion Detection
Luca Foschini, Ashish Thapliyal, Lorenzo Cavallaro, Christopher Kruegel and Giovanni Vigna.
|
13:00 - 14:30 | Lunch |
14:30 - 16:00 | Session VII: Practical Applications
Optimizing the Block Ciphers for Wireless Sensor Networks
Devesh Jinwala, Dhiren Patel and Kankar Dasgupta.
Privacy Management for Facebook
Enkh-Amgalan Baatarjav, Ram Dantu and Santi Phithakkitnukoon.
HyDRo - Hybrid Development of Roles
Ludwig Fuchs and Guenther Pernul.
|
16:00 - 16:30 | Break |
16:30 | Conference Closing |
|