CQRE'99 - Call for Participation
Detlef Hühnlein
huehnlein at secunet.de
Wed Oct 13 14:31:01 UTC 1999
Dear Listmembers!
Sorry for crossposting. The Call for Participation below
might be of interest for you. To register, please visit
http://www.cqre.net . You might want to note that the
early bird registration period already expires on Oct. 22,
which is less than two weeks from now.
I would be looking forward to seeing you at CQRE.
Best regards
Detlef Huehnlein
***************************************************************
Call for Participation
CQRE [Secure] Congress & Exhibition
Duesseldorf, Germany, Nov. 30 - Dec. 2 1999
---------------------------------------------------------------
provides a new international forum covering most aspects of
information security with a special focus to the role of
information security in the context of rapidly evolving
economic processes.
---------------------------------------------------------------
Part I covers stratecial issues of IT-Security while Part II
will discuss more technical issues, like
- SmartCard Technology / Security
- Public Key Infrastructures
- Network Security
- Mobile Security
- Intrusion Detection
- Enterprise Security
- Security Design
- Electronic Payment
- Electronic Commerce
- Cryptography
- Espionage
- Interoperability
- Biometrics
- Risk Management
- Signature Laws
- Training / Awareness
for example.
----------------------------------------------------------------
CQRE-PROGRAM:
----------------------------------------------------------------
Part I - Strategical Aspects
Tuesday, November 30, 1999
----------------------------------------------------------------
09.30 Opening: Chairman Paul Arlman, Federation of European
Stock Exchange
09.45 Keynote Dr.Hagen Hultzsch, Deutsche Telekom AG
"A corporate group in transition - how Deutsche Telekom is
preparing for the digital economy."
10.15 Keynote Jean-Paul Figer, Cap Gemini S.A
"Brave Digital World? The balance between chances and
risks for the information society."
10:45 Coffee
11:15 Five parallel Workshops:
Workshop 1 - "Values & standards" (Prof.Dr. Gertrud Höhler)
Workshop 2 - "Law & regulation" (Klaus-Dieter Scheurle)
Workshop 3 - "Strategy & success"
Workshop 4 - "Role of technology" (Karl-Heinz Streibich)
Workshop 5 - "Monitoring & control" (Piet van Reenen)
12.45 Lunch
14.15 Keynote Dr.Ulrich Schumacher, CEO Infineon
"Network Citizen - what does the networked citizen and
consumer stand to gain and lose?"
15.15 Workshop results (Moderator Paul Arlman)
15.45 Coffee
16.00 Summary / 10-point-programme
17.00 Happy Hour
18.00 Platform debate (Moderator Klaus-Peter Siegloch, ZDF)
----------------------------------------------------------------
Part II - Technical Aspects:
Wednesday, December 1, 1999
----------------------------------------------------------------
09.00 R.Baumgart: Welcome
09.15 B.Schneier: "Attack trees - a novel methodology
for risk management."
10.00 Refreshments
10.15 Four parallel tracks:
I. Risk Management:
D.Povey: "Developing Electronic Trust Policies
Using a Risk Management Model"
J.Hopkinson: "Guidelines for the Management
of IT-Security"
II. Security Design:
L.Romano, A.Mazzeo and N.Mazzocca: "SECURE:
a simulation tool for PKI design"
D.Basin: "Lazy Infinite State Analysis
of Security Protocols"
III. Enterprise Security:
P.Kunz: "The case for IT-Security"
W.Wedl: "Integrated Enterprise Security - Examples
conducted in large European Enterprises"
B.Esslinger: "The PKI development of Deutsche Bank"
IV. Tutorial:
H.Handschuh: "Cryptographic SmartCards"
11.45 Lunch
13.15 S.Senda: "Electronic Cash in Japan"
14.00 M.Yung, Y.Tsiounis, M.Jakobsson, D.MRhaihi:
"Panel: Electronic payments where do we go
from here?"
15.00 Four parallel tracks:
I. SmartCard Issues
R.Kehr, J.Possega, H.Vogt: "PCA: Jini-based
Personal Card Assistant"
M.Nyström, J.Brainard: "An X.509-Compatible
Syntax for Compact Certificates"
II. Applications
D.Hühnlein, J.Merkle: "Secure and cost efficent
electronic stamps"
K.Sako: "Implementation of a Digital
Lottery Server on WWW"
III. PKI-experiences
J.Lopez, A.Mana, J.J.Ortega: "CerteM:
Certification System Based on Electronic
Mail Service Structure"
K.Schmeh: "A method for developing PKI models"
J.Hughes: "The Realities of PKI Inter-Operability
IV. Tutorial
S.Kent: "How many Certification Authorities
are Enough?"
16.45 J.J.Quisquater: "Attacks on SmartCards
and Countermeasures"
17.00 M.Kuhn: "How tamper-resistant are
todays SmartCards?"
18.15 L. Martini,M. Kuhn, J.J.Quisquater, Hamann:
"Secure SmartCards - Fact or Fiction"
19.00 Get-together with music (4 to the bar)
and CQRE - Speakers corner - rump session
----------------------------------------------------------------
Part II - Technical Aspects:
Thursday, December 2, 1999
----------------------------------------------------------------
09.00 R.Baumgart : Good morning
09.15 P.Landrock: Mobile Commerce
10.15 Four parallel tracks:
I. Mobile Security
M.Borchering: "Mobile Security - an
Overview of GSM, SAT and WAP"
S.Pütz, R.Schmitz, B.Tiez: "Secure Transport of
Authentication Data in Third Generation Mobile
Phone Networks"
II. Cryptography
J.P. Seifert, N.Howgrave: "Extending Wiener`s
attack in the Presence of many decrypting
exponents"
S.Micali, L.Reyzin: "Improving The Exact
Security of Fiat-Shamir Signature Schemes"
III. Network Security
C.Yuen-yan: "On Privacy Issues of Internet
Access Services via Proxy Servers"
Jorge Davila, Javier Lopez and Rene Peralta:
"VPN solutions in diverse layers of the
TCP/IP stack"
B.Schneier, Mudge, D.Wagner: "Cryptanalysis of
Microsofts PPTP Authentification Extensions
(MS-CHAPv2)"
IV. Tutorial
I.Winkler: "How to fight the inner enemy"
12.00 J.S. Coron: "On the security of RSA padding"
12.45 Lunch
14.15 Four parallel tracks:
I. PKI
A.Young, M.Yung: "Auto-Recoverable
Auto-Certifiable Cryptosystems (a survey)"
II. Intrusion Detection
D.Bulatovic, D.Velasevic: "A Distributed Intrusion
Detection System based on Bayesian Alarm
Networks"
III. Espionage
M.Fink: "Espionage - State of the Art and
Countermeasures"
W.Haas: "Informational Self Defense"
IV. Tutorial
A.Philip: "Secure E-business"
15.00 S.Kent: "Security for Certification Authorities
- A system approach"
16.00 Four parallel tracks:
I. Interoperability
S.Gupta, J.Mulvenna, S.Ganta, L.Keys, D.Walters:
"Interopreability Characteristics of S/MIME
Products"
M.Rubia, J.C.Cruellas, M.Medina: "The DEDICA
Project: The Solution to the Interoperability
Problems between the X.509 and EDIFACT Public
Key Infrastructures"
II. Biometrics
H.Arendt: "Biometrics - State of the Art"
A.P.Gonzales-Marcos, C.Sanchez-Avila,
R.Sanchez-Reillo: "Multiresolution Analysis and
Geometric Measure for Biometric Identification"
III. Signature Laws
Workshop - Leader, K.Keus: "German Signature Act -
Expiriences made for Europe?"
IV. Tutorial
J.Massey: "Cryptography at a glance"
17.45 S.Baker, R.Schlechter, T.Peters, T.Barassi:
"Panel: Perspectives for a global signature law"
18.30 R.Baumgart: Closing Remarks
More information about the bind-users
mailing list