|
|
Schedule
Attention |
The IS3 Conference will take place from May 3rd to May 5th. The information below is a tentative schedule of events. Please note that it is subject to change until and during the time of the event. See footer below for last update. |
Tuesday, May 3th
8:00am~9:00am |
Breakfast |
|
Coffee, juice, and various breakfast treats will be served in room 151 of the Love building to start the day. |
9:00am~11:00am |
Pairing-Based Cryptography |
|
Antoine Joux will give an introductory survey on the use of elliptic curve pairings in cryptography, including a discussion of applications and security. |
11:00pm~12:00pm |
Keynote: Recent Advances in Iterated Hash Functions |
|
Antoine Joux will present recent advances in the field of iterated hash functions. This includes both generic results, which apply for all such
functions, and specific advances on the SHA and MD family. |
12:00pm~1:00pm |
Lunch Break |
1:00pm~2:30pm |
Tamper-Proof Software |
|
Alec Yasinsac will present ways of securing software to prevent tampering later by end users and other programmers. |
3:00pm~5:00pm |
NSA Presentations |
|
(Due to security concerns, this presentation is only available to conference members who attend. No followup materials will be posted from this presentation.) |
5:00pm~7:00pm |
Jobs in Information Security (Job Fair) |
|
Conference participants are invited to spend this time sharing and showcasing in room 151 of the Love building. |
Wednesday, May 4th
8:00am~9:00am |
Breakfast |
|
Coffee, juice, and various breakfast treats will be served in room 151 of the Love building to start the day. |
9:00am~11:00am |
Legal and Ethical Issues |
|
Jim Davis will analyze the legal and ethical issues surrounding information security, including the questions raised by heightened connectivity and the legal implications of free data transmission. |
11:00pm~12:00pm |
Keynote: Recognized Research Problems in Information Security |
|
Jim Davis will discuss the nature of problems in the Information Security field and explore various ways of solving these problems. |
12:00pm~1:00pm |
Lunch Break |
1:00pm~2:30pm |
What Is In A Name? An Introduction To Identity-Based Encryption |
|
Dr. Breno de Medeiros will be speaking about identity-based encryption, a relatively new cryptographic tool introduced in 2001 by Boneh and Franklin. It opens the door to intriguing possibilities, such as using any identifier (unique name, e-mail address, etc.) as a key to enable private communication between two parties. |
3:00pm~4:00pm |
FAMU Presentations |
|
Deidre Evans and Ed Jones will present from FAMU's Computer Science department. |
4:00pm~5:00pm |
Panel Discussion: Information Security and You |
|
Mike Burmester and Alec Yasinsac will briefly discuss how Information Security is relevant to individual attendees, then offer time for question and answer. |
5:00pm~7:00pm |
Reception |
|
A free catered reception will be held in room 151 of the Love building for conference attendees and speakers. |
Thursday, May 5th
8:00am~9:00am |
Breakfast |
|
Coffee, juice, and various breakfast treats will be served in room 151 of the Love building to start the day. |
9:00am~11:00am |
On the Evolution of Adversary Models in Security Protocols |
|
Invariably, new technologies introduce new vulnerabilities which, in principle, enable new attacks by increasingly potent adversaries. In this talk, Dr. Gligor will provide a brief overview of adversary models: those required by program and data sharing, those required by computer communication and networking, and those required by mobile ad-hoc and sensor network technologies. |
11:00pm~12:00pm |
Keynote: Cryptolite: How Lite Can Secure Crypto Get? |
|
Virgil Gligor will deliver a keynote session on lightweight cryptography applications in practical working environments. |
12:00pm~1:00pm |
Lunch Break |
1:00pm~2:30pm |
Recent Developments in Group Key Exchange |
|
Dr. Mike Burmester will speak concerning recent developments in group key exchange in modern cryptographic environments. |
3:00pm~3:30pm |
Scholarship Presentations |
|
Melody Venable will provide information for students interested in the NSF or DoD scholarship programs. Come learn how you can qualify! |
3:30pm~4:00pm |
SAIT Labs Tour |
|
Melody Venable will give a tour of the SAIT Laboratories to interested conference members. |
4:00pm~5:00pm |
Farewell Discussions |
|
|
|
|
|