Tag: RFID

Jan 10

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2012  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Jan 07

IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST

HOST-2012 IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST

June 3-4, Moscone Center, San Francisco, CA
Held in conjunction with DAC-2012 (http://www.hostsymposium.org)


                              Call for Papers


A wide range of applications, from secure RFID tagging to high-end trusted computing,
relies on dedicated and trusted hardware platforms. The security and trustworthiness of
such hardware designs are critical to their successful deployment and operation. Recent
advances in tampering and reverse engineering show that important challenges lie
ahead. For example, secure electronic designs may be affected by malicious circuits,
Trojans that alter system operation. Furthermore, dedicated secure hardware
implementations are susceptible to novel forms of attack that exploit side-channel
leakage and faults. Third, the globalized, horizontal semiconductor business model
raises concerns of trust and intellectual-property protection. HOST 2012 is a forum for
novel solutions to address these challenges. Innovative test mechanisms may reveal
Trojans in a design before they are able to do harm. Implementation attacks may be
thwarted using side-channel resistant design or fault-tolerant designs. New securityaware
design tools can assist a designer in implementing critical and trusted
functionality, quickly and efficiently.
The IEEE International Symposium on Hardware Oriented Security and Trust seeks
original contributions in the area of hardware-oriented security. This includes tools,
design methods, architectures, and circuits. In addition, novel applications of secure
hardware are especially welcome. HOST 2012 seeks contributions based on, but not
limited to, the following topics.
• Trojan detection and isolation
• Implementation attacks and countermeasures
• Side channel analysis and fault analysis
• Intellectual property protection and metering
• Tools and methodologies for secure hardware design
• Hardware architectures for cryptography
• Hardware security primitives: PUFs and TRNGs
• Applications of secure hardware
• Interaction of secure hardware and software
To present at the symposium, submit an Acrobat (PDF) version of your paper on the
symposium submission website. The page limit is 6 pages, double column, IEEE
format, with a minimum font size of 10 points. Submissions must be anonymous and
must not identify the submitting authors, directly or indirectly, anywhere in the
manuscript.


SCHEDULE:

Submission of Paper:         January 20, 2012
Notification of Acceptance:  March 23, 2012
Camera Ready Paper:          April 13, 2012



General Chair
K. Mai, CMU


Program Chair
R. Karri, Polytechnic Inst of New York U.


Vice-program Chair
F. Koushanfar, Rice University


Panel Chair
Y. Makris, UT Dallas


Publicity Chair
G. Qu, U. Maryland


Registration Chair
J. Plusquellic, U. of New Mexico


Publication Chair
T. Huffmire, Naval Postgraduate School


Finance Chair
W. Robinson, Vanderbilt


Industry Liaison

M. Hsiao, Virginia Tech


Steering Committee

M. Tehranipoor (chair), U. Connecticut
J. Plusquellic, U. of New Mexico
F. Koushanfar, Rice University
M. Potkonjak, UC Los Angeles


Program Committee

D. Acharyya, Verigy
D. Arora, Intel
S. Bhunia, Case Western Reserve U.
S. Devadas, MIT
J. Dworak, Southern Methodist U.
S. Fazzari, Booz Allen Hamilton
Y. Fei, Northeastern U.
J. Guajardo, Bosch
S. Guilley, ENST Paris
I. Harris, UC Irvine
T. Huffmire, Naval Postgraduate School
R. Kastner, UC San Diego
Y. Makris, UT Dallas
D. Naccache, ECNS Paris
L. Nazandhali, Virginia Tech
C. Paar, Ruhr U.
Y. Pino, Air Force Research Labs
N. Potlapally, Intel
G. Qu, U. of Maryland
F. Regazzoni, U. Catholique de Louvain
P. Rohatgi, CRI
M. Rivain, Crypto Experts
U. Ruhrmair, TU Munchen
A. Sadeghi, TU Darmstadt
K. Sakiyama, U. of ElectroCommunications
P. Schaumont, Virginia Tech
S. Skorobogatov, U. of Cambridge
M. Soma, U. of Washington
F. Standaert, U. Catholique de Louvain
J. Zambreno, Iowa State U.

Dec 19

11th European Conference on Information Warfare ECIW 2012

11th European Conference on Information Warfare ECIW 2012.  

 

Topics for submissions may include, but are not limited to:

§         i-Warfare principles, theory and policy and techniques

§         Cyber conflict, Cyber-terrorism and Cyber-fraud

§         Physical security

§         National security policy

§         Information security governance and management

§         Information warfare and security education

§         Information Assurance and Information operations

§         Psychological warfare

§         Perception management

§         Legal issues concerned with information warfare and e-Crime

§         Ethical, political and social issues relating to information warfare

§         SMEs – Small-to-medium Size Enterprises Security issues

§         Critical national infrastructure protection

§         The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)

§         Hacking and cracking

§         Biometrics

§         e-Intelligence/counter-intelligence

§         Cryptography : classical  and malicious

§         Networked Centric War

§         Network anomaly detection models

§         Malware and anti-malware technologies

§         Non-traditional enemies

§         Wireless Threats

§         Reflector attacks

§         Computers-as-weapons

§         Risk Management

§         Virtual Intrusion Detection

§         Collaborative decision making

§         Acute situational awareness

§         Firewalls

§         Phishing and spam

§         Digital forensics

§         Current Anti Virus Technologies

§         PSYOPS

§         Mobile Virus

§         RFID Virus

§         ISO 27001

§         Defence steganography and Unidirectional linguistic steganography

§         Traffic classification

§         Public Key Infrastructure

§         Machine Learning Risk

§         Mathematical-filtering

§         SecureMDA

§         Image-processing

          


Nov 24

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

*****************
CALL FOR PAPERS
*****************

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2011  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Nov 10

Workshop on Cryptographic Hardware and Embedded Systems CFP

 

+————————————————————————-

!                                                                        

!                                    CHES 2012 

!                             

!                       Workshop on Cryptographic Hardware

!                               and Embedded Systems   

!                    

!                                 Leuven, Belgium                           

!                               9-12 September 2011          

!                                                                        

+————————————————————————-+

 

Important Dates

===============

 

  Submission deadline:      March 5, 2012, 23:59 PST

  Acceptance notification:  May 14, 2012

  Final version due:        June 18, 2012

  Workshop presentations:   September 9-12, 2012

 

 

Background, aim and scope

=========================

 

     CHES covers new results on all aspects of the design and analysis of cryptographic hardware and software implementations. The workshop builds a bridge between the cryptographic research community and the cryptographic engineering community. With participants from industry, academia, and government organizations, the number of participants has grown to over 300 in recent years.

 

     In addition to a track of high-quality presentations, CHES 2012 will offer invited talks, tutorials, a poster session, and a rump session. CHES 2012 especially encourages submissions on the following two subjects: DESIGN METHODS TO BUILD SECURE AND EFFICIENT HARDWARE OR SOFTWARE and LEAKAGE RESILIENT CRYPTOGRAPHY INCLUDING NEW MODEL DEFINITIONS AND ANALYSIS AND THE DESIGN OF NEW CRYPTOSYSTEMS. All submitted papers will be reviewed by at least four Program Committee members.

    

     This year, authors will be invited to submit brief rebuttals of the reviews before the final acceptances are made.

 

 

TOPICS

======

 

The topics of CHES 2012 include but are not limited to:

 

 

Cryptographic implementations

 

– Hardware architectures for public-key, secret-key and hash algorithms

– Cryptographic processors and co-processors

– Hardware accelerators for security protocols (security processors, network processors, etc.)

– True and pseudorandom number generators

– Physical unclonable functions (PUFs)

– Efficient software implementations of cryptography

 

 

Attacks against implementations and countermeasures against these attacks

 

– Side channel attacks and countermeasures

– Fault attacks and countermeasures

– Hardware tampering and tamper-resistance

 

 

Tools and methodologies

 

– Computer aided cryptographic engineering

– Verification methods and tools for secure design

– Metrics for the security of embedded systems

– Secure programming techniques

– FPGA design security

– Formal methods for secure hardware

 

 

Interactions between cryptographic theory and implementation issues

 

– New and emerging cryptographic algorithms and protocols targeting embedded devices

– Special-purpose hardware for cryptanalysis   

– Leakage resilient cryptography

 

 

Applications

 

– Cryptography in wireless applications (mobile phone, WLANs, etc.)

– Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)

– Hardware IP protection and anti-counterfeiting

– Reconfigurable hardware for cryptography

– Smart card processors, systems and applications

– Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)

– Secure storage devices (memories, disks, etc.)

– Technologies and hardware for content protection

– Trusted computing platforms

 

 

Instructions for CHES Authors

=============================

 

Authors are invited to submit original papers via electronic submission. Details of the electronic submission procedure will be posted on the CHES webpage when the system is activated. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The paper should be at most 12 pages (excluding the bibliography and clearly marked appendices), and at most 18 pages in total, using at least 11-point font and reasonable margins. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submissions will be blind-refereed. Only original research contributions will be considered. Submissions which substantially duplicate work that any of the authors have published elsewhere, or have submitted in parallel to any other conferences or workshops that have proceedings will be instantly rejected. The IACR Policy on Irregular Submissions (http://www.iacr.org/irregular.html) will be strictly enforced.

 

 

Poster Session

==============

 

The CHES technical sessions will include a slot for a poster session, open to any submitter.

 

Arrangements for submitting posters will be announced later.

 

Tutorial Sessions

=================

 

The program chairs welcome suggestions for half-day tutorials at ches2012programchairs@iacr.org

 

 

Program Committee

=================

 

To be announced!

 

Organizational Committee

========================

 

All correspondence and/or questions should be directed to either of the Organizational Committee members:

 

Program co-Chairs:

 

  Emmanuel Prouff

  Oberthur Technologies (France)

  Email: ches2012programchairs@iacr.org

 

and

 

  Patrick Schaumont

  Virginia Tech (USA)

  Email: ches2012programchairs@iacr.org

 

General co-Chairs:

 

  Lejla Batina

  Radboud University Nijmegen (Netherlands) and K.U. Leuven (Belgium)

  Email: lejla@cs.ru.nl

 

and

 

  Ingrid Verbauwhede

  K.U. Leuven (Belgium)

  Email: Ingrid.Verbauwhede@esat.kuleuven.be

 

Workshop Proceedings

====================

 

The proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series in time for distribution at the workshop. Accepted papers should follow the LNCS default author instructions at URL http://www.springer.de/comp/lncs/authors.html (see file typeinst.pdf).  In order to be included in the proceedings, the authors of an accepted paper must guarantee to present their contribution at the workshop.

Aug 30

New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs

http://www.cosic.esat.kuleuven.be/rfidsec09/Papers/31_datenfeuer_rfidsec.pdf

Aug 18

RFID Spoofer | Korben

RFID Spoofer | Korben.