From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id 568237FC86 for ; Sat, 21 Mar 2015 21:48:14 +0100 (CET) Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of grlmc@urv.cat) identity=pra; client-ip=193.144.16.76; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="grlmc@urv.cat"; x-conformance=sidf_compatible Received-SPF: Pass (mail2-smtp-roc.national.inria.fr: domain of grlmc@urv.cat designates 193.144.16.76 as permitted sender) identity=mailfrom; client-ip=193.144.16.76; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="grlmc@urv.cat"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@mta04.urv.cat) identity=helo; client-ip=193.144.16.76; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="grlmc@urv.cat"; x-sender="postmaster@mta04.urv.cat"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BnAQCX2A1VnEwQkMFCGoNYTgEBCrNkkEQGgjsKhXECAgKBJ0wBAQEBAQERAQEBAQEICwkJFC6EGwgEDDYHBBUYBSo+BhICJQEEEwgDEAEBBIgSAQg3oCOSY4JPk3gBH4pUgzqBMAQDAQEeD4JWDEEdgRYFhQuFV4NOgh8EgQGCaoIkhHY6gnaDLoYAhjGEEW4BgQEJF4EhAQEB X-IPAS-Result: A0BnAQCX2A1VnEwQkMFCGoNYTgEBCrNkkEQGgjsKhXECAgKBJ0wBAQEBAQERAQEBAQEICwkJFC6EGwgEDDYHBBUYBSo+BhICJQEEEwgDEAEBBIgSAQg3oCOSY4JPk3gBH4pUgzqBMAQDAQEeD4JWDEEdgRYFhQuFV4NOgh8EgQGCaoIkhHY6gnaDLoYAhjGEEW4BgQEJF4EhAQEB X-IronPort-AV: E=Sophos;i="5.11,443,1422918000"; d="scan'208";a="127087387" Received: from mta04.urv.cat ([193.144.16.76]) by mail2-smtp-roc.national.inria.fr with ESMTP; 21 Mar 2015 21:48:13 +0100 X-IronPort-AV: E=Sophos;i="5.11,443,1422918000"; d="scan'208";a="60585346" Received: from pmbox1.urv.cat ([193.144.16.40]) by mta.urv.cat with ESMTP; 21 Mar 2015 21:48:13 +0100 Received: from Carlos1 (244.Red-83-36-215.dynamicIP.rima-tde.net [83.36.215.244]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by pmbox1.urv.cat (Postfix) with ESMTPSA id F2E0E23FB2; Sat, 21 Mar 2015 21:48:00 +0100 (CET) From: "GRLMC" To: "GRLMC" Date: Sat, 21 Mar 2015 21:48:00 +0100 Message-ID: <9BA4933D6D154FA4874608DE1FEC7BD2@Carlos1> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Office Outlook 11 Thread-index: AdBkGFGfh1jMrZtqRla/glpTD/3wcg== X-MIMEOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 X-Antivirus: avast! (VPS 150321-1, 21/03/2015), Outbound message X-Antivirus-Status: Clean X-Validation-by: grlmc@urv.cat Subject: [Caml-list] InfoSec 2015: registration deadline 3 April *To be removed from our mailing list, please respond to this message with UNSUBSCRIBE in the subject line* ********************************************************************** INTERNATIONAL SUMMER SCHOOL ON INFORMATION SECURITY InfoSec 2015 Bilbao, Spain July 6-10, 2015 Organized by Deusto University Rovira i Virgili University http://grammars.grlmc.com/InfoSec2015/ ********************************************************************** --- 4th registration deadline: April 3, 2015 --- ********************************************************************** AIM: InfoSec 2015 will be a major research training event addressed to graduates and postgraduates in the first steps of their academic career. With a global scope, it aims at updating them about the most recent advances in the critical and fast developing area of information security, which covers a large spectrum of current exciting academic research and industrial innovation. It refers to procedures to defend information from unauthorized access, use, modification, recording or destruction, with a critical role to play in order to avoid or minimize risks in the digital world. Renowned academics and industry pioneers will lecture and share their views with the audience. Most information security subareas will be displayed, namely: computer security, cryptography, privacy, cyber security, mobile security, network security, world wide web security, fraud prevention, data protection, etc. Main challenges of information security will be identified through 4 keynote lectures, 31 six-hour courses, and 1 round table, which will tackle the most active and promising topics. The organizers believe outstanding speakers will attract the brightest and most motivated students. Interaction will be a main component of the event. ADDRESSED TO: Graduates and postgraduates from around the world. There are no formal pre-requisites in terms of academic degrees. However, since there will be differences in the course levels, specific background knowledge may be required for some of them. InfoSec 2015 is also appropriate for more senior people who want to keep themselves updated on recent developments and future trends. They will surely find it fruitful to listen and discuss with major researchers, industry leaders and innovators. REGIME: In addition to keynotes, 4 courses will run in parallel during the whole event. Participants will be able to freely choose the courses they will be willing to attend as well as to move from one to another. VENUE: InfoSec 2015 will take place in Bilbao, the capital of the Basque Country region, famous for its gastronomy and the seat of the Guggenheim Museum. The venue will be: DeustoTech, School of Engineering Deusto University Avda. Universidades, 24 48014 Bilbao KEYNOTE SPEAKERS: Jan Camenisch (IBM Research, Zurich), Privacy in a Digital World: a Lost Cause? Hao Chen (University of California, Davis), (In)security of Mobile Apps in Untrusted Networks Jennifer Seberry (University of Wollongong), The Global Village: the Beginning of the Need for Computer Security [via videoconference] Gene Tsudik (University of California, Irvine), Off-line Proximity-based Social Networking PROFESSORS AND COURSES: N. Asokan (Aalto University), [intermediate] Mobile Security: Overview of Hardware Platform Security and Considerations of Usability Jan Camenisch (IBM Research, Zurich), [introductory/intermediate] Technologies to Protect Online Privacy Hao Chen (University of California, Davis), [intermediate/advanced] Security of the Mobile App Ecosystem Nicolas T. Courtois (University College London), [introductory/intermediate] Security of ECDSA in Bitcoin and Crypto Currency Claude Cr=E9peau (McGill University, Montr=E9al), [introductory/intermediat= e] Quantum Computation, Cryptography and Cryptanalysis Joan Daemen (ST Microelectronics Belgium, Diegem), [introductory/intermediate] Sponge Functions, Keccak and SHA-3 Sajal K. Das (Missouri University of Science and Technology, Rolla), [intermediate/advanced] Securing Cyber-Physical Systems: Challenges and Opportunities Sabrina De Capitani di Vimercati (University of Milan), [introductory/intermediate] Security and Privacy in the Cloud Herv=E9 Debar (T=E9l=E9com SudParis), [introductory/intermediate] Detection= and Reaction to Attacks: from Intrusion Detection to Cyber-Defense Rosario Gennaro (City University of New York), [intermediate/advanced] A Survey of Verifiable Delegation of Computation Trent Jaeger (Pennsylvania State University, University Park), [intermediate/advanced] How to Add Security Enforcement to Legacy Programs Somesh Jha (University of Wisconsin, Madison), [intermediate/advanced] Analysis Techniques in Information Security Antoine Joux (Pierre et Marie Curie University, Paris), [introductory/intermediate] Discrete Logarithms in Finite Fields Marc Joye (Technicolor R&I, Los Altos), [introductory/intermediate] Secure Public-Key Cryptosystems Lars R. Knudsen (Technical University of Denmark, Lyngby), [introductory/intermediate] Block Ciphers: the Workhorses in Cryptography Songwu Lu (University of California, Los Angeles), [introductory/intermediate] Cellular Network Security: Issues and Defenses Catherine Meadows (Naval Research Laboratory, Washington DC), [introductory/intermediate] Formal Analysis of Cryptographic Protocols Nasir Memon (New York University), [introductory/intermediate] User Authentication Ethan L. Miller (University of California, Santa Cruz), [intermediate/advanced] Securing Stored Data in a Connected World Stefano Paraboschi (University of Bergamo), [introductory/intermediate] Data Protection in Network-enabled Systems Bart Preneel (KU Leuven), [introductory/intermediate] Cryptology: State of the Art and Research Challenges Jean-Jacques Quisquater (Catholic University of Louvain), [introductory/intermediate] The History of RSA: from Babylon to Smart Cards Shantanu Rane (Palo Alto Research Center), [introductory/intermediate] Privacy-preserving Data Analytics: Problems, Solutions and Challenges Mark Ryan (University of Birmingham), [introductory/intermediate] Designing Security Protocols: Electronic Voting, and Electronic Mail Rei Safavi-Naini (University of Calgary), [introductory/intermediate] Information-theoretically Secure Communication Stefan Saroiu (Microsoft Research, Redmond), [advanced] Protecting Data on Smartphones and Tablets Using Trusted Computing Milind Tambe (University of Southern California, Los Angeles), [introductory/intermediate] Introduction to the Emerging Science of Security Games Gene Tsudik (University of California, Irvine), [intermediate/advanced] Security and Privacy in Candidate Future Internet Architectures Yang Xiao (University of Alabama, Tuscaloosa), [introductory/advanced] Security in Smart Grids Wenyuan Xu (University of South Carolina, Columbia), [intermediate] Security and Privacy Analysis of Embedded Systems Yuliang Zheng (University of North Carolina, Charlotte), [introductory] Cryptography and the Future of Money ORGANIZING COMMITTEE: Adrian Horia Dediu Carlos Mart=EDn-Vide (co-chair) Borja Sanz (co-chair) Florentina Lilica Voicu REGISTRATION: The registration form can be found at: http://grammars.grlmc.com/InfoSec2015/registration.php The selection of up to 8 courses requested in the registration template is only tentative and non-binding. For the sake of organization, it will be helpful to have an approximation of the respective demand for each course. Since the capacity of the venue is limited, registration requests will be processed on a first come first served basis. The registration period will be closed and the on-line registration facility disabled when the capacity of the venue will be complete. It is much recommended to register prior to the event. FEES: Fees are a flat rate covering the attendance to all courses during the week. There are several early registration deadlines. Fees depend on the registration deadline. ACCOMMODATION: Accommodation for participants is available at the Colegio Mayor Deusto (student hostel). Since there may exist problems to find accommodation in Bilbao at a reasonable price during the week of the event, the organizers' advice is to book as soon as possible, and anyway by 27 May. To do it, write to Carlson Wagonlit Travel at estudiantesud@carlsonwagonlit.es CERTIFICATE: Participants will be delivered a certificate of attendance. QUESTIONS AND FURTHER INFORMATION: florentinalilica.voicu@urv.cat ACKNOWLEDGEMENTS: Deusto University Rovira i Virgili University --- Este mensaje no contiene virus ni malware porque la protecci=F3n de avast! = Antivirus est=E1 activa. http://www.avast.com