[5893] in cryptography@c2.net mail archive
CQRE'99 - Call for Participation
daemon@ATHENA.MIT.EDU (Detlef =?iso-8859-1?Q?H=FChnlein?=)
Wed Oct 13 14:29:57 1999
Message-ID: <380497A5.B10453AB@secunet.de>
Date: Wed, 13 Oct 1999 15:31:01 +0100
From: Detlef =?iso-8859-1?Q?H=FChnlein?= <huehnlein@secunet.de>
MIME-Version: 1.0
To: cqre@secunet.de
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Dear Listmembers! =
Sorry for crossposting. The Call for Participation below
might be of interest for you. To register, please visit
http://www.cqre.net . You might want to note that the =
early bird registration period already expires on Oct. 22, =
which is less than two weeks from now. =
I would be looking forward to seeing you at CQRE. =
Best regards
Detlef Huehnlein
=
***************************************************************
Call for Participation =
CQRE [Secure] Congress & Exhibition
Duesseldorf, Germany, Nov. 30 - Dec. 2 1999
---------------------------------------------------------------
provides a new international forum covering most aspects of
information security with a special focus to the role of
information security in the context of rapidly evolving =
economic processes.
---------------------------------------------------------------
Part I covers stratecial issues of IT-Security while Part II
will discuss more technical issues, like =
- SmartCard Technology / Security
- Public Key Infrastructures
- Network Security
- Mobile Security
- Intrusion Detection
- Enterprise Security
- Security Design
- Electronic Payment
- Electronic Commerce
- Cryptography
- Espionage
- Interoperability
- Biometrics =
- Risk Management
- Signature Laws =
- Training / Awareness
for example.
----------------------------------------------------------------
CQRE-PROGRAM:
----------------------------------------------------------------
Part I - Strategical Aspects
Tuesday, November 30, 1999
----------------------------------------------------------------
09.30 Opening: Chairman Paul Arlman, Federation of European =
Stock Exchange =
09.45 Keynote Dr.Hagen Hultzsch, Deutsche Telekom AG
"A corporate group in transition - how Deutsche Telekom is =
preparing for the digital economy."
10.15 Keynote Jean-Paul Figer, Cap Gemini S.A
"Brave Digital World? The balance between chances and =
risks for the information society."
10:45 Coffee
11:15 Five parallel Workshops:
Workshop 1 - "Values & standards" (Prof.Dr. Gertrud H=F6hler)
Workshop 2 - "Law & regulation" (Klaus-Dieter Scheurle) =
Workshop 3 - "Strategy & success" =
Workshop 4 - "Role of technology" (Karl-Heinz Streibich)
Workshop 5 - "Monitoring & control" (Piet van Reenen)
12.45 Lunch
14.15 Keynote Dr.Ulrich Schumacher, CEO Infineon
"Network Citizen - what does the networked citizen and =
consumer stand to gain and lose?"
15.15 Workshop results (Moderator Paul Arlman) =
15.45 Coffee
16.00 Summary / 10-point-programme =
17.00 Happy Hour
18.00 Platform debate (Moderator Klaus-Peter Siegloch, ZDF)
----------------------------------------------------------------
Part II - Technical Aspects:
Wednesday, December 1, 1999
----------------------------------------------------------------
09.00 R.Baumgart: Welcome =
09.15 B.Schneier: "Attack trees - a novel methodology =
for risk management."
10.00 Refreshments =
10.15 Four parallel tracks:
I. Risk Management:
D.Povey: "Developing Electronic Trust Policies =
Using a Risk Management Model"
J.Hopkinson: "Guidelines for the Management
of IT-Security"
II. Security Design:
L.Romano, A.Mazzeo and N.Mazzocca: "SECURE:
a simulation tool for PKI design"
D.Basin: "Lazy Infinite State Analysis =
of Security Protocols"
III. Enterprise Security:
P.Kunz: "The case for IT-Security"
W.Wedl: "Integrated Enterprise Security - Examples =
conducted in large European Enterprises"
B.Esslinger: "The PKI development of Deutsche Bank"
IV. Tutorial:
H.Handschuh: "Cryptographic SmartCards"
11.45 Lunch
13.15 S.Senda: "Electronic Cash in Japan"
14.00 M.Yung, Y.Tsiounis, M.Jakobsson, D.MRhaihi:
"Panel: Electronic payments where do we go =
from here?"
15.00 Four parallel tracks:
I. SmartCard Issues
R.Kehr, J.Possega, H.Vogt: "PCA: Jini-based =
Personal Card Assistant"
M.Nystr=F6m, J.Brainard: "An X.509-Compatible =
Syntax for Compact Certificates"
II. Applications
D.H=FChnlein, J.Merkle: "Secure and cost efficent
electronic stamps"
K.Sako: "Implementation of a Digital =
Lottery Server on WWW"
III. PKI-experiences
J.Lopez, A.Mana, J.J.Ortega: "CerteM: =
Certification System Based on Electronic =
Mail Service Structure"
K.Schmeh: "A method for developing PKI models"
J.Hughes: "The Realities of PKI Inter-Operability
IV. Tutorial
S.Kent: "How many Certification Authorities =
are Enough?"
16.45 J.J.Quisquater: "Attacks on SmartCards =
and Countermeasures"
17.00 M.Kuhn: "How tamper-resistant are =
todays SmartCards?"
18.15 L. Martini,M. Kuhn, J.J.Quisquater, Hamann: =
"Secure SmartCards - Fact or Fiction"
19.00 Get-together with music (4 to the bar)
and CQRE - Speakers corner - rump session
----------------------------------------------------------------
Part II - Technical Aspects:
Thursday, December 2, 1999
----------------------------------------------------------------
09.00 R.Baumgart : Good morning =
09.15 P.Landrock: Mobile Commerce
10.15 Four parallel tracks:
I. Mobile Security
M.Borchering: "Mobile Security - an
Overview of GSM, SAT and WAP"
S.P=FCtz, R.Schmitz, B.Tiez: "Secure Transport of
Authentication Data in Third Generation Mobile
Phone Networks"
II. Cryptography
J.P. Seifert, N.Howgrave: "Extending Wiener`s =
attack in the Presence of many decrypting
exponents"
S.Micali, L.Reyzin: "Improving The Exact =
Security of Fiat-Shamir Signature Schemes"
III. Network Security
C.Yuen-yan: "On Privacy Issues of Internet =
Access Services via Proxy Servers"
Jorge Davila, Javier Lopez and Rene Peralta: =
"VPN solutions in diverse layers of the =
TCP/IP stack"
B.Schneier, Mudge, D.Wagner: "Cryptanalysis of
Microsofts PPTP Authentification Extensions
(MS-CHAPv2)"
IV. Tutorial
I.Winkler: "How to fight the inner enemy"
12.00 J.S. Coron: "On the security of RSA padding"
12.45 Lunch
14.15 Four parallel tracks:
I. PKI
A.Young, M.Yung: "Auto-Recoverable =
Auto-Certifiable Cryptosystems (a survey)"
II. Intrusion Detection
D.Bulatovic, D.Velasevic: "A Distributed Intrusion =
Detection System based on Bayesian Alarm
Networks"
III. Espionage
M.Fink: "Espionage - State of the Art and =
Countermeasures"
W.Haas: "Informational Self Defense"
IV. Tutorial
A.Philip: "Secure E-business"
15.00 S.Kent: "Security for Certification Authorities =
- A system approach"
16.00 Four parallel tracks: =
I. Interoperability
S.Gupta, J.Mulvenna, S.Ganta, L.Keys, D.Walters: =
"Interopreability Characteristics of S/MIME
Products"
M.Rubia, J.C.Cruellas, M.Medina: "The DEDICA =
Project: The Solution to the Interoperability =
Problems between the X.509 and EDIFACT Public =
Key Infrastructures"
II. Biometrics =
H.Arendt: "Biometrics - State of the Art"
A.P.Gonzales-Marcos, C.Sanchez-Avila,
R.Sanchez-Reillo: "Multiresolution Analysis and
Geometric Measure for Biometric Identification"
III. Signature Laws =
Workshop - Leader, K.Keus: "German Signature Act -
Expiriences made for Europe?"
IV. Tutorial
J.Massey: "Cryptography at a glance"
17.45 S.Baker, R.Schlechter, T.Peters, T.Barassi:
"Panel: Perspectives for a global signature law"
18.30 R.Baumgart: Closing Remarks