Advance Program:
CMS 2005

Salzburg, Austria, September 19-21, 2005

  19/09/05 20/09/05 21/09/05
8.00-9.00 Registration    
9.00-9.15 Welcome Note    
9.15-10.30 Keynote Talk 1
Christian Cachin

Keynote Talk 2
Ton Kalker

Keynote Talk 3
Ingemar J. Cox

10.30-11.00 COFFEE BREAK
11.00-12.30 Applied Cryptography Media Encryption
Network Security
Biometrics & Access Control
Work in Progress Session 2**
12.30-14.00 LUNCH BREAK
14.00-15.30 DRM & E-commerce*
Special Session: XML Security*
Multimedia Security
Work in Progress Session 1**
 
15.30-16.00 COFFEE BREAK
16.00-17.30 XML Security Privacy
Mobile Security
17.30- 17.30-20.00 Welcome Reception 17.30-22.00 City Walk and Conference Dinner
* starts at 13.30
** work in progress session - poster format

Detailed Program

Monday Sept. 19:

Mon, Sept. 19 8.00 - 9.00: Registration

Mon, Sept. 19 9.00 - 9.15: Welcome Note

Mon, Sept. 19 9.15 - 10.30: Keynote 1 - Christian Cachin - 'From Cryptography to Steganography':

Steganography concerns methods to hide information by embedding a secret message within another seemingly harmless message, which is communicated over an open network. As the goal of steganography is to hide the presence of a message, it can be seen as the complement of cryptography, whose goal is to hide the content of a communicated message. A formal model of steganography has recently been developed, and it confirms this intuition. In this talk, I will present the theory of steganography, its development, and its applications.

Christian Cachin graduated in Computer Science from ETH Zürich (1993). From 1992-1993 he worked at ABB Corporate Research on theory and applications of artificial neural networks. From 1993-1997 he was at ETH Zürich performing research in cryptography and information theory and obtained his Ph.D. in Computer Science from ETH Zürich in 1997. From 1997 to 1998 he was postdoctoral researcher at the MIT Laboratory for Computer Science, with Prof. Ron Rivest, one of the inventors of public-key cryptography. He has been a Research Staff Member at IBM Zurich Research Lab since 1998, where he was involved in a number of projects in security and distributed systems.

He has authored more than thirty publications in computer science, holds several patents on secure protocols and cryptographic algorithms, and has been a member of several program committees of technical conferences. He is a Director of the International Association for Cryptologic Research (IACR). Together with Jan Camenisch he was program chair and organized Eurocrypt 2004. His current research interests are cryptography, network security, fault tolerance and distributed systems.

Mon, Sept. 19 11.00 - 12.30: Applied Cryptography

Chair: Christian Cachin

018. Fast Contract Signing with Batch Oblivious Transfer. Lubica Stanekova and Martin Stanek, Slovak University of Technology, Slovakia and Comenius University, Slovakia

027. An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. Stefan Tillich and Johann Großschädl and Alexander Szekely, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria

137. Self-Healing Key Distribution Schemes with Sponsorization. Germán Sáez, Universitat Politècnica de Catalunya

Mon, Sept. 19 13.30 - 15.30: DRM & E-commerce

Chair: Ton Kalker

023. Effective Protection Against Phishing and Web Spoofing. Rolf Oppliger, eSECURITY Technologies, Switzerland, Sebastian Gajek, Ruhr University Bochum, Germany

031. Identity based DRM: Personal Entertainment Domain. Paul Koster, Frank Kamperman, Peter Lenoir and Koen Vrielink, Philips Research

040. Trust and rights in multimedia content management systems. Jaime Delgado, Víctor Torres, Silvia Llorente, Eva Rodríguez, Universitat Pompeu Fabra, Barcelona

043. Signature Amortization Using Multiple Connected Chains. Qusai Abuein (1) , Susumu Shibusawa (2), (1) Graduate School of Science and Engineering, Ibaraki University, Japan, (2) Dept. of Computer and Information Sciences Ibaraki University, Japan

Mon, Sept. 19 13.30 - 15.30: Special Session XML Security

Chair: Rüdiger Grimm

1. Experience XML Security. Dominik Schadow, FH Furtwangen and SALT Solutions GmbH Munich, Germany

2. Using the XML Key Management Specification (and breaking X.509 rules as you go). Stephen Farrel and Jose Kahan

3. How to make a Federation manageable. Christian Geuer-Pollmann, University of Siegen and Microsoft EMIC

4. XML Signatures in an Enterprise Service Bus Environment. Eckehard Hermann and Dieter Kessler, Software AG Darmstadt, Germany

Mon, Sept. 19 16.00 - 17.30: XML Security

Chair: Rüdiger Grimm

050. Secure XMaiL or How to get rid of legacy code in secure E-Mail applications. Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk, MediaSec Technologies GmbH and Ruhr-University Bochum

091. Integrating XML Linked Time-stamps in OASIS Digital Signature Services. Ana Isabel González-Tablas Ferreres, Karel Wouters, KU Leuven

129. Trustworthy Verification and Visualisation of Multiple XML-Signatures. Sebastian Gajek and Wolfgang Kubbilun and Joerg Schwenk and Michael Psarros, Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum and Mediasec Technologies GmbH

Tuesday Sept. 20:

Tue, Sept. 20 9.15 - 10.30: Keynote 2 - Ton Kalker - 'About the Architecture of DRM Systems':

Firstly, in this talk we give an overview of the architecture of modern DRM systems. Secondly, we discuss some new issues in DRM development, including DRM interoperability, person-centric DRM and extensions to the broadcast domain.

Ton was born in The Netherlands in 1956. He received his M.S. degree in mathematics in 1979 from the University of Leiden, The Netherlands. From 1979 until 1983, while he was a Ph.D. candidate, he worked as a Research Assistant at the University of Leiden. From 1983 until December 1985 he worked as a lecturer at the Computer Science Department of the Technical University of Delft. In January 1986 he received his Ph.D. degree in Mathematics.

In December 1985 he joined the Philips Research Laboratories Eindhoven. Until January 1990 he worked in the field of Computer Aided Design. He specialized in (semi) automatic tools for system verification. He was a member of the Processing and Architectures for Content MANagement group (PACMAN) of Philips Research, working on security of multimedia content, with an emphasis on watermarking and fingerprinting for video and audio. In November 1999 he became a part-time professor in the Signal Processing Systems group of Jan Bergmans in the area of 'signal processing methods for data protection'. Currently is at Hewlett-Packet Laboratories in Palo Alto leading a small group on Media Security.

He is a Fellow of the IEEE for his contributions to practical applications of watermarking, in particular watermarking for DVD-Video copy protection. He co-founded the IEEE Transactions on Information Forensics and Security.

His other research interests include wavelets, multirate signal processing, motion estimation, psycho physics, digital video compression and medical image processing.

Tue, Sept. 20 11.00 - 12.30: Media Encryption

Chair: Dominik Engel

021. A Key Embedded Video Codec for Secure Video Multicast. Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min, Computer Science and Technology Department, Tsinghua University

070. Puzzle - A Novel Video Encryption Algorithm. Fuwen Liu and Hartmut Koenig, Department of Computer Science, BTU, Cottbus

082. Selective Image Encryption using JBIG. Roman Pfarrhofer and Andreas Uhl, Carinthia Tech Institute (CTI) and Salzburg University

Tue, Sept. 20 11.00 - 12.30: Network Security

Chair: Bart de Decker

020. Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-hoc Networks. Huafei Zhu, Feng Bao, Tieyan Li, Department of Information Security, Institute for Infocomm Research, A-Star

090. Polymorphic Code Detection with GA optimized Markov Models. Udo Payer and Stefan Kraxberger, Institute of Applied Information Processing and Communications

119. A Secure Context Management for QoS-aware Vertical Handovers in 4G Networks. Minsoo Lee and Gwanyeon Kim and Sehyun Park, School of Electrical & Electronics Engineering, Chung-Ang University

Tue, Sept. 20 14.00 - 15.30: Multimedia Security

Chair: Andreas Uhl

028. On reversibility of random binning techniques: multimedia perspectives. Sviatoslav Voloshynovskiy-1, Oleksiy Koval-1, Emre Topak-1, Jose Emilio Vila-Forcen-1 and Pedro Comesana Alfaro-2, and Thierry Pun-1, 1-CUI-University of Geneva, Stochastic Image Processing Group, Switzerland, 2-Signal Processing in Communications Group Signal Theory & Communications Department, University of Vigo, Spain

032. A Graph-Theoretic Approach to Steganography. Stefan Hetzl and Petra Mutzel, Vienna University of Technology and University of Dortmund

106. Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme. Andre Adelsbach and Markus Rohe and Ahmad-Reza Sadeghi, Ruhr Universität Bochum, Germany

Tue, Sept. 20 14.00 - 15.30: Work in Progress Session 1 - Poster Format

143. Biometrics: Different approaches for using Gaussian Mixture Models in Handwriting. Sascha Schimke, Athanosios Valsamakis, Claus Vielhauer, Yannis Stylianou, Universitaet Magdeburg

108. INVUS: INtelligent VUlnerability Scanner. Türker Akyüz, Ibrahim Sogukpinar, Gebze Institute of Technology, Computer Engineering

138. Personal Rights Management - enabling privacy rights in digital online content. Mina Deng, Lothar Fritsch, Klaus Kursawe, KU Leuven, Uni Frankfurt

107. Flexible Traitor Tracing for Anonymous Attacks. Hongxia Jin and Jeffery Lotspiech, IBM Almaden Research Center

133. Efficient Key Distribution for Closed Meetings in the Internet. Fuwen Liu and Hartmut Koenig, TU Cottbus

Tue, Sept. 20 16.00 - 17.30: Privacy

Chair: Jana Dittmann

030. Video Surveillance: A Distributed Approach to protect Privacy. Martin Schaffer and Peter Schartner, University of Klagenfurt, Austria

037. Privacy-Preserving Electronic Health Records. Liesje Demuynck (KU Leuven, Belgium), Bart De Decker (KU Leuven, Belgium)

081. Using XACML for Privacy Control in SAML-based Identity Federations. Wolfgang Hommel, Leibniz Computing Center Munich

Tue, Sept. 20 16.00 - 17.30: Mobile Security

Chair: Stefan Katzenbeisser

007. Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. Wiebke Dresp, Department of Information Systems, University of Regensburg, Germany

039. Assessment of Palm OS susceptibility to malicious code threats. Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen, Distrinet research group, Department of Computer Science, K.U.Leuven Celestijnenlaan 200A, B-3001 Leuven, Belgium

085. Implementation of Credit-Control Authorization with embedded the Mobile IPv6 Authentication. HyunGon Kim and ByeongKyun Oh, Mokpo National University and Mokpo National University

Wednesday Sept. 21:

Wed, Sept. 21 9.15 - 10.30: Keynote 3

Ingemar J. Cox - 'Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking':

Ingemar Cox is currently Professor and Chair of Telecommunications in the Departments of Electronic Engineering and Computer Science at University College London as well as Director of UCL's Adastral Park Postgraduate Campus. He is currently a holder of a Royal Society Wolfson Fellowship. He received his B.Sc. from University College London and Ph.D. from Oxford University. He was a member of the Technical Staff at AT\&T Bell Labs at Murray Hill from 1984 until 1989 where his research interests were focused on mobile robots. In 1989 he joined NEC Research Institute in Princeton, NJ as a senior research scientist in the computer science division. At NEC, his research shifted to problems in computer vision and he was responsible for creating the computer vision group at NECI. He has worked on problems to do with stereo and motion correspondence and multimedia issues of image database retrieval and watermarking. In 1999, he was awarded the IEEE Signal Processing Society Best Paper Award (Image and Multidimensional Signal Processing Area) for a paper he co-authored on watermarking. From 1997-1999, he served as Chief Technical Officer of Signafy, Inc, a subsiduary of NEC responsible for the commercialization of watermarking. Between 1996 and 1999, he led the design of NEC's watermarking proposal for DVD video disks and later colloborated with IBM in developing the technology behind the joint "Galaxy" proposal supported by Hitachi, IBM, NEC, Pioneer and Sony. In 1999, he returned to NEC Research Institute as a Research Fellow.

He is a senior member of the IEEE, a Fellow of the IEE and a Fellow of the Royal Society for Arts and Manufactures. He is on the editorial board of the Pattern Analysis and Applications Journal and an associate editor of the IEEE Trans. on Information Forensics and Security. He is co-author of a book entitled "Digital Watermarking" and the co-editor of two books, `Autonomous Robots Vehicles' and `Partitioning Data Sets: With Applications to Psychology, Computer Vision and Target Tracking'.

Wed, Sept. 21 11.00 - 12.30: Biometrics & Access Control

Chair: Martin Steinebach

064. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. Andrea Oermann, Claus Vielhauer, Jana Dittmann, Otto-von-Guericke University Magdeburg, Germany

092. Decentralised Access Control in 802.11 Networks. Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno, Politecnico di Torino, Dipartimento di Automatica e Informatica

124. Multimodal Biometrics for Voice and Handwriting. Claus Vielhauer and Tobias Scheidat, Advanced Multimedia and Security Lab, Otto-von-Guericke University Magdeburg

Wed, Sept. 21 11.00 - 12.30: Work in Progress Session 2 - Poster Format

008. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. Taras Holotyak and Jessica Fridrich and Sviatoslav Voloshynovskiy, Department of Electrical and Computer Engineering, SUNY at Binghamton, USA and Department of Computer Science, University of Geneva, Switzerland

078. Applying LR Cube Analysis to JSteg Detection. Kwangsoo Lee and Changho Jung and Sangjin Lee and HyungJun Kim and Jongin Lim, CIST Korea

034. Digital signatures based on invertible watermarks for video authentication. Enrico Hauer and Jana Dittmann, Fraunhofer Institute IPSI, 64293 Darmstadt, Germany and Otto-von-Guericke University

036. A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. R. Villan, S. Voloshynovskiy, F. Deguillaume, Y. Rytsar, O. Koval, E. Topak, E. Rivera, and T. Pun, Computer Vision and Multimedia Laboratory, Dept. of Computer Science, University of Geneva

077. Semantically Extended Digital Watermarking Model for Multimedia Content. Huajian Liu and Lucilla Croce Ferri and Martin Steinebach, Fraunhofer IPSI - Integrated Publication and Information Systems Institute

088. An Architecture for Secure Policy Enforcement in E-Government Services Deployment. Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland, Institute for Data Communication Systems, University of Siegen, Germany

098. Some Critical Aspects of the PKIX TSP. Cristian Marinescu and Nicolae Tapus, University "Politehnica" Bucharest

110. Motivations for a theoretical approach to WYSIWYS. Antonio Lioy and Gianluca Ramunno and Marco Domenico Aime, and Massimiliano Pala, Politecnico di Torino, Dipartimento di Automatica e Informatica