Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via
To receive your credentials via mail again, please click here.
You can also access the full news archive.
** Main objective of the research is to overcome limitations of existing intrusion-detection systems (IDS), which are presently mainly based on expert knowledge or contemporary online learning. For IDSs, the continuous learning of new and changing attack patterns, and the use of relevant attributes or features that represent abnormal behaviour in network-traffic data is of greatest importance in order to detect hostile activities in dynamic network environments. Online-learning systems with an embedded online-feature selection have a great potential to assist in understanding the nature of network intrusions as well as to assist in establishing the ability to process massive amounts of data in large-scale networks. Specific objectives of the proposed research are two-fold:
- To develop new computational-intelligent methods for online-learning in malware and intrusion-detection systems that can deal with the challenges of massive data, obfuscation, adversarial activities, changing environments and the lack of a real-labeled reference data and training dataset, and
- To develop new embedded-online-feature-selection methods without prior knowledge or limited number of features (open-system system approach)
** Specific background and skills in one or more of the following areas is highly desirable:
- Excellent MSc degree in computer science/engineering, mathematics or statistics
- Experience in numerical analysis, algorithms and complexity analysis
- Knowledge in machine learning and pattern recognition
- Programming ability in one or more of the following languages: Matlab, Python, Java,C, C++, or C#
- Fluent in English: oral and written communication skills
- Ability to communicate technical concepts clearly and effectively
- Scientific publications in re
* 2 Ph.D. Students in Computer Security
* 1 Ph.D. Student in Socio-Technical Aspects of Security
Duration: 3 years (extension up to 4 years in total is possible).
For more information see URLs:
* 1 Post-Doc in Socio-Technical Aspects of Security
Duration 2 years (extension up to 5 years is possible).
For more information and for application see URL:
All the positions are related to the CORE-FNR project \\\"Socio-Technical Analysis of Security and Trust\\\" (STAST). STAST will be highly interdisciplinary. It teams up the Interdisciplinary Centre for Reliability, Security and Trust (SnT), the Applied Security and Information Assurance (APSIA), led by Prof. P. Y. A. Ryan who is also the principal investigator of the project, and Security and Trust of Software Systems (SaToSS), led by Prof. S. Mauw, and the Educational Measurement and Applied Cognitive Science (EMACS), ref. Dr. V. Koenig.
Eurocrypt 2011 was held at Sokos Viru Hotel, Tallinn, Estonia, on 15-19 May 2011. The conference was organized in Sokos Viru Hotel, next to the old town of Tallinn, and a majority of the participants lived either in the same hotel or nearby. Participation fee was 500 USD (regular participants) and 250 USD for students.
A total of 31 research papers, categorized into 11 sessions, were presented, selected from 167 submissions. Ronald Cramer, CWI, and Phong Nguyen from IBM Research delivered the invited lectures on the topics "The Arithmetic Codex: Theory and Applications" and "Lattice Reduction Algorithms: Theory and Practice", respectively.
The Rump Session was chaired by Nigel Smart who was helped by men in shining armor.
The conference banquet was held at the Art Museum of Estonia. The best paper award was also presented during the banquet to Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain and Daniele Venturi for their paper "Efficient Authentication from Hard Learning Problems".
The conference ended successfully on 19 May, having attracted about 305 participants (more than 60 being students), from approximately 40 countries, mainly from Europe (approximately 185), Asia (70) and North America (40). We thank the sponsors for their generous support and contributions to the success of the conference.
Program Chair was Kenny Paterson and General Chair was Helger Lipmaa.
SECRYPT 2011 was integrated in ICETE (International Conference on e-Business and Telecommunications) a joint conference combining six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security processing and multimedia applications, and wireless networks.
This year SECRYPT received 160 submissions. After a strict selection process, the SECRYPT program included 22 papers as full papers (13.75% of submissions) and 16 as short papers (10% of submissions). Additionally, 20 papers were accepted for poster presentation. With these acceptance ratios, SECRYPT 2011 continues the tradition of previous conferences, a quality conference with high caliber.
The best papers of SECRYPT will be invited to appear in a post-conference book that will be published by Springer-Verlag composed by a selection of papers from ICETE.
In addition to the presentation sessions, SECRYPT 2011 included four outstanding keynote lectures, which are relevant to today’s lines of research and technical innovation. These talks were presented by internationally distinguished researchers, namely: Han-Chieh Chao, National Ilan University, Taiwan ”WiMAX?- A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks“, by Vincenzo Piuri, Università degli Studi di Milano, Italy “Biometrics Privacy: Technologies and Applications”, by Enrique Cabello, University Rey Juan Carlos, Spain “Face Biometrics without Intrusion in Airport” and by Winfried Lamersdorf, University of Hamburg, Germany “Paradigms of Distributed Software Systems: Services, Processes, and Self-Organization” who helped enhancing the overall quality of this conference with their contributions.
The papers were organized in 15 sessions ranging the hot topics of nowadays such as statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics.
The organizing committee included the ICETE conference co-Chairs Prof. Mohammad S. Obaidat, Monmouth University, USA and Professor José Sevillano, University of Seville, Spain and the SECRYPT program chairs Prof. Pierangela Samarati, Università degli Studi di Milano, Italy and Prof. Javier Lopez, University of Malaga, Spain.
SECRYPT 2011 was sponsored by INSTICC (The Institute for Systems and Technologies of Information, Control and Communication) and technically co-sponsored by IEEE- Institute of Electrical and Electronics Engineers and IEEE Systems Council. The conference was held in cooperation with IACR (International Association for Cryptologic Research), IEICE (The Institute of Electronics, Information and Communication Engineers), SWIM (IEICE Special Interest Group on Software Interprise Modelling), ATI (Associación de Técnicos de Informática), CEPIS( Council of European Professional Informatics Societies), FIDETIA (Fundación para la Investigación y el Desarollo de las Tecnologías de la Información en Andalucía), INES (Iniciativa Española de Software y Servicios), ACM SIGMIS (Special Interest Group on Management Information Systems), ACM SIGSAC (Special Interest Group on Security, Audit and Control), ACM SIGMM (Special Interest Group on Multimedia).
Regarding the best paper award, SECRYPT has recognized the paper, "BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl" from Kazumaro Aoki, Günther Roland, Yu Sasaki and Martin Schläffer as the best paper of the conference. As the best Student Paper Award, SECRYPT acknowledged the paper untitled “A Method for Flexible Reduction over Binary Fields Using a Field Multiplier” by Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan and S. K. Nandy as the best student paper presented at the conference.
Lecturer/Senior Lecturer in Computer Science
SCSSE is one of Australia’s leading teaching and research schools. Applications are invited for a continuing position at Lecturer level B/C. The appointee will participate in the teaching of computer science, software engineering and information security subjects.
Applicants must have completed a PhD in Computer Science or a closely related discipline and have teaching experience in computer science, software engineering, or information security. Applicants must have a strong research record of information security and cryptography and has ability to collaborate across the research themes of the School is highly desirable.
Candidates must address the criteria specified in the relevant Position Description which is available from our website. For further information about these roles please contact Associate Professor Yi Mu, Head, School of Computer Science and Software Engineering on +61 2 4221 5881 or email ymu (at) uow.edu.au.
Applications Close 18 December 2011
Quote Ref No. 24101
How to Apply: Please go to our website http://employment.uow.edu.au/
to submit your application online & for more information about the position.