Announcements
SIGINT in Europe During the Cold War
More and more students of the Cold War begin to realize that the intelligence communities played an important role during the Cold War. In recent years in particular the importance of Signals Intelligence (SIGINT) has been stressed and especially the capabilities and possibilities of reading and deciphering diplomatic, military, commercial and other Communications of other nations. This growing awareness of the importance of intelligence applies not only to the activities of the big services but also to those of the smaller nations like for example the Netherlands. For this exact reason a couple of years ago the Netherlands Intelligence Studies Association (NISA) was established in which academics and (former and still active) members of the Netherlands intelligence community work together in order to promote research into the history of Dutch intelligence communities. This growing interest had led in Holland to publications dealing with the history of the Dutch internal security service (1995), the Dutch Navy Intelligence (1997) and the Netherlands foreign intelligence service (November 1998). As honorary secretary of the NISA it is my pleasure to announce that the NISA will host an international conference dealing with THE IMPORTANCE OF SIGINT IN WESTERN EUROPE IN THE COLD WAR This conference with a particular emphasis on Sigint and the Northwestern European nations will take place on Saturday November 27 in Amsterdam. The line up of the program is as follows: SPEAKERS: 09.45: Opening of the Conference and Welcome to the speakers and participants 10.00: Matthew Aid (United States, historian) Introduction on the importance of SIGINT in the Cold War 10.45: coffee 11.00: Richard Aldrich (United Kingdom, University of Nottingham) GCHQ and Sigint in the Cold War 11.45: Erich Schmidt-Eenboom (Germany, Forschungsinstitut f�ür Friendenspolitik) The BND, German Military Forces and Sigint in the Cold War 12.30: lunch 13.30: Alf Jacobsen (Norway, NRK) Scandinavia, Sigint and the Cold War 14.15: Cees Wiebes (Netherlands, NISA) The history of the WKC (Dutch NSA/GCHQ) 15.00: Tea 15.30: Wies Platje (Netherlands, NISA) Dutch Sigint and the conflict with Indonesia, 1950 - 62 16.15: Round Table discussion The importance of Sigint during the Cold War 17.00: Closing Remarks + Reception Since the number of seats is strictly limited to 100, you are requested to submit your registration as soon as possible. Places will be attributed on a first registered-first served basis. The conference rate is US $ 80 including lunch and drinks at the reception. Please register as quickly as possible by sending an E-mail or letter to the honorary secretary of the NISA, Dr. Cees Wiebes, at the following address: Dr. Cees Wiebes Honorary secretary NISA P.O. Box 18 210 1001 ZC Amsterdam The Netherlands E-mail: WIEBES@PSCW.UVA.NL
DIMACS Workshop on the Management of Digital IP
DIMACS Workshop on the Management of Digital IP
April 17-18, 2000, Rutgers, New Jersey, USA
CALL FOR PARTICIPATION
Critical to the development of e-commerce is the management of digital
intellectual property (IP). Technology has challenged the status quo of
IP management in many ways. Widespread use of personal computers and
Internet communication creates vast opportunities for producers, distributors,
and consumers of digital works of all forms, but it also threatens to render
copying and modification of these works completely uncontrollable. DIMACS
will sponsor a two-day series of technical talks and "position statements"
on the design, development, and deployment of IP-management technology that
strikes the right balance between the need to control copying and modification
and the desire to foster innovative uses of digital works that have been
enabled by computing and communication advances.
Speakers are encouraged to address all technical, legal, and business aspects
of digital IP management. Companies offering relevant products and services
are encouraged to participate and to submit abstracts or papers outlining
their approach.
Topics appropriate for this workshop include, but are not limited to:
* Intellectual property protection.
* Anti piracy techniques.
* Legal issues in the protection of digital rights.
* New business models for managing digital rights.
* Passive content protection, e.g. watermarking, tracing traitors.
* Active content protection, e.g. software tamper resistance.
* Hardware solutions to content protection.
WORKSHOP URL: http://crypto.stanford.edu/DIMACS/
INSTRUCTIONS FOR AUTHORS
Authors are strongly encouraged to send their submission electronically.
Authors unable to submit electronically are invited to send a cover letter
and 4 copies of a submission (double-sided copies preferred) to the
postal address below. Submissions must be received on or before
January 17, 2000 (or postmarked by January 5, 2000, and sent via airmail
or courier). The cover letter should contain the submission's title and
the names and affiliations of the authors and should identify the contact
author including e-mail and postal addresses.
Authors are invited to submit a one-page abstract or a full-length
paper or position statement.
(1) Abstract submissions should contain a title, list of authors, and
an abstract describing the proposed talk. The abstract should
indicate whether the authors intend to submit a full-length paper
in case the abstract is accepted.
(2) Full-length submissions should begin with a title, list of authors, and
a short abstract. The introduction should summarize the
contributions of the work at a level appropriate for a
non-specialist reader. The submission should be at most 12 pages
excluding the bibliography and clearly marked appendices,
using at least 11-point font and reasonable margins. The organizers do
not guarantee that they will read appendices; so submissions should be
intelligible without them.
Notification of acceptance or rejection will be sent to authors by
February 14, 2000.
CONFERENCE PROCEEDINGS
We will decide whether to publish a proceedings for the workshop based on
the number of full-length submissions. If the number and quality of
full-length submissions are sufficient, proceedings will be published
by the American Mathematical Society as a volume in the DIMACS series.
CONFIRMED SPEAKERS:
(1) Paul Kocher, Cryptography Research.
(2) Stuart Haber, InterTrust.
(3) Narayanan Shivakumar, Univ. Washington
(4) Jon Callas, Kroll-O'Gara
DATES:
SUBMISSION: January 17, 2000
ACCEPTANCE: February 14, 2000
Pre-PROCEEDINGS VERSION: March 24, 2000
ORGANIZING COMMITTEE:
Dan Boneh, Stanford University, USA
Joan Feigenbaum, AT&T Labs -- Research
Ramarathnam Venkatesan, Microsoft Research
ADDRESS FOR ELECTRONIC SUBMISSIONS:
dabo@cs.stanford.edu
ADDRESS FOR NON-ELECTRONIC SUBMISSIONS:
Dan Boneh, DIMACS workshop,
Gates 475,
Stanford, CA, 94304-9045
U.S.A
Phone: (1) 650-725-3897 Fax: (1) 650-725-4671
E-mail: dabo@cs.stanford.edu
STIPENDS: A limited number of stipends are available to those unable
to obtain funding to attend the workshop. Students giving talks
at the workshop are encouraged to apply if such assistance is
needed. Requests for stipends should be addressed to Joan Feigenbaum
at jf@research.att.com or 973 360-8442.
New Reports in the Theory of Cryptography Library
The library is currently located at http://philby.ucsd.edu/cryptolib/ .
===========================================================================
LIST OF NEW PAPERS (June 15 -- October 1st, 1999)
99-14: I. Damgard, Concurrent Zero-Knowledge is Easy in Practice , June
1999. Revised July 1999.
99-15: O. Goldreich, S. Goldwasser and S. Micali, Interleaved Zero-Knowledge
in the Public-Key Model , June 1999. Revised July 1999.
99-16: M. Bellare and S. Miner, A forward-secure digital signature scheme,
July 1999.
99-17: V. Shoup, A composition theorem for universal one-way hash functions,
July 1999.
99-18: M. Bellare and A. Sahai, Non-Malleable Encryption: Equivalence
between Two Notions, and an Indistinguishability-Based Characterization,
July 1999.
99-19: J. Hastad and M. Naslund, Security of all RSA and Discrete Log Bits,
August 1999.
99-20: S. Micali and L. Reyzin, Improving the Exact Security of Digital
Signature Schemes, August 1999.
99-21: M. Boyarsky, Public-Key Cryptography and Password Protocols: The
Multi-User Case, September 1999.
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR