Category: News

Apr 04

Billions of web users could be hit by internet certification compromise – 3/24/2011 – Computer Weekly

Billions of web users could be hit by internet certification compromise – 3/24/2011 – Computer Weekly

 

Apr 04

LizaMoon: What you need to know

PCWorld – Tony Bradley

http://www.pcworld.com/businesscenter/article/224125/lizamoon_attack_what_you_need_to_know.html

Apr 02

With hacking, music can take control of your car

via With hacking, music can take control of your car (in french)

Apr 02

Unlock most cardkey door control systems with Caribou

Unlock most cardkey door control systems with Caribou. (about the same subject in french)

Apr 02

UPDATE: Samsung keylogger could be false alarm

via UPDATE: Samsung keylogger could be false alarm.

Apr 02

Layer 8: FBI wants public help solving encrypted notes from murder mystery

via Layer 8: FBI wants public help solving encrypted notes from murder mystery.

Mar 27

25 infamous viruses over the last 25 years

via 25 ans de virus, 25 ans d’innovations..

Mar 25

Best Ph.D. Thesis on Security and Trust Management

 

ERCIM STM WG 2011 Award for the

Best Ph.D. Thesis on Security and Trust Management

 

The European Research Consortium in Informatics and Mathematics (ERCIM – www.ercim.org) has a technical WG on Security and Trust Management (STM – www.iit.cnr.it/STM-WG) for performing a series of activities, as research projects, workshop/conference organization, dissemination of knowledge, for increasing the European research and development capabilities on security, trust and privacy.

 

One of the main goals of the WG is to promote the scientific growth of young researchers interested in the field of security and trust management. Thus, ERCIM STM WG established an award for the best Ph.D. thesis in this area in order to increase the visibility of the young researchers inside the ERCIM scientific community as well as in the larger European one.

 

The topics of interest include, but are not limited to:

·      rigorous semantics and computational models for security and trust;

·      security and trust management architectures, mechanisms and policies;

·      networked systems security;

·      privacy and anonymity;

·      identity management;

·      ICT for securing digital as well as physical assets;

·      cryptography.

 

Applications for the 2011 Award are open to all Ph.D. holders that defended their thesis during 2010 in any European University. Applications consisting of the Ph.D. Thesis (in PDF format), a short summary of the Thesis (mandatory in English) and at least two letters of support (one from a researcher of an ERCIM STM WG Institution) should be sent by May 8th 2011 to the WG Chair, Javier Lopez <jlm@lcc.uma.es>.

 

Theses will be evaluated by a Committee appointed from the European research community. The theses will be judged on the basis of scientific quality, originality, clarity of presentation, as well as potential impact of the results. The Committee members for the competition are:

 

·      Joris Claessens, Microsoft, Germany

·      Jorge Cuellar, Siemens, Germany

·      Javier Lopez, Univ. of Malaga, Spain

·      Fabio Martinelli, CNR, Italy

·      Vashek Matyas, Masaryk Univ., Czech Republic

·      Bart Preneel, KUL, Belgium

·      Alexander Pretschner, KIT, Germany

·      Ketil Stoelen, SINTEF, Norway

·      Edgar Weippl, SBA, Austria

 

The ceremony for the Award will be held during the 7th International Workshop on Security and Trust Management (STM 2011), 27-28 June 2011, in Copenhagen (Denmark).


Mar 25

International Conference on Information Society (i-Society 2011)

 

International Conference on Information Society

(i-Society 2011)

June 27-29, 2011, London, UK

http://www.i-society.eu

 

The International Conference on Information Society (i-Society 2011) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society 2011 is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.

The mission of i-Society 2011 conference is to provide opportunities for collaboration of professionals and researchers to share existing and generate new knowledge in the field of information society. The conference encapsulates the concept of interdisciplinary science that studies the societal and technological dimensions of knowledge evolution in digital society. The i-Society bridges the gap between academia and industry with regards to research collaboration and awareness of current development in secure information management in the digital society.

The topics in i-Society 2011 include but are not confined to the following areas:

New Enabling Technologies

  • Internet technologies
  • Wireless applications
  • Mobile Applications
  • Multimedia Applications
  • Protocols and Standards
  • Ubiquitous Computing
  • Virtual Reality
  • Human Computer Interaction
  • Geographic information systems
  • e-Manufacturing

Intelligent Data Management

  • Intelligent Agents
  • Intelligent Systems
  • Intelligent Organisations
  • Content Development
  • Data Mining
  • e-Publishing and Digital Libraries
  • Information Search and Retrieval
  • Knowledge Management
  • e-Intelligence
  • Knowledge networks

Secure Technologies

  • Internet security
  • Web services and performance
  • Secure transactions
  • Cryptography
  • Payment systems
  • Secure Protocols
  • e-Privacy
  • e-Trust
  • e-Risk
  • Cyber law
  • Forensics
  • Information assurance
  • Mobile social networks
  • Peer-to-peer social networks
  • Sensor networks and social sensing

e-Learning

  • Collaborative Learning
  • Curriculum Content Design and Development
  • Delivery Systems and Environments
  • Educational Systems Design
  • e-Learning Organisational Issues
  • Evaluation and Assessment
  • Virtual Learning Environments and Issues
  • Web-based Learning Communities
  • e-Learning Tools
  • e-Education

e-Health

  • Data Security Issues
  • e-Health Policy and Practice
  • e-Healthcare Strategies and Provision
  • Medical Research Ethics
  • Patient Privacy and Confidentiality
  • e-Medicine

e-Art

  • Legal Issues
  • Patents
  • Enabling technologies and tools

e-Science

  • Natural sciences in digital society
  • Biometrics
  • Bioinformatics
  • Collaborative research

Industrial Developments

  • Trends in learning
  • Applied research
  • Cutting-edge technologies

Application of Choatic Computing

  • Chaos-Based Data Security

e-Society

  • Global Trends
  • Social Inclusion
  • Intellectual Property Rights
  • Social Infonomics
  • Computer-Mediated Communication
  • Social and Organisational Aspects
  • Globalisation and developmental IT
  • Social Software

e-Governance

  • Democracy and the Citizen
  • e-Administration
  • Policy Issues
  • Virtual Communities

e-Business

  • Digital Economies
  • Knowledge economy
  • eProcurement
  • National and International Economies
  • e-Business Ontologies and Models
  • Digital Goods and Services
  • e-Commerce Application Fields
  • e-Commerce Economics
  • e-Commerce Services
  • Electronic Service Delivery
  • e-Marketing
  • Online Auctions and Technologies
  • Virtual Organisations
  • Teleworking
  • Applied e-Business
  • Electronic Data Interchange (EDI)

Research in Progress

  • Ongoing research from undergraduates, graduates/postgraduates and professionals
  • Projects
  • Collaborative Research

Mar 24

RSA hacked, data exposed that could ‘reduce the effectiveness’ of SecurID tokens — Engadget

via RSA hacked, data exposed that could 'reduce the effectiveness' of SecurID tokens — Engadget.