SIGINT in Europe During the Cold War

More and more students of the Cold War begin to realize that the
intelligence communities played an important role during the Cold War. In
recent years in particular the importance of Signals Intelligence (SIGINT)
has been stressed and especially the capabilities and possibilities of
reading and deciphering diplomatic, military, commercial and other
Communications of other nations. 

This growing awareness of the importance of intelligence applies not only
to the activities of the big services but also to those of the smaller
nations like for example the Netherlands. For this exact reason a couple of
years ago the Netherlands Intelligence Studies Association (NISA) was
established in which academics and (former and still active) members of the
Netherlands intelligence community work together in order to promote
research into the history of Dutch intelligence communities. This growing
interest had led in Holland to publications dealing with the history of the
Dutch internal security service (1995), the Dutch Navy Intelligence (1997)
and the Netherlands foreign intelligence service (November 1998). 

As honorary secretary of the NISA it is my pleasure to announce that the
NISA will host an international conference dealing with 


This conference with a particular emphasis on Sigint and the Northwestern
European nations will take place on Saturday November 27 in Amsterdam.

The line up of the program is as follows:							


09.45: 	Opening of the Conference and Welcome to the
		speakers and participants

10.00: 	Matthew Aid (United States, historian) 
	 	Introduction on the importance of SIGINT in the Cold War

10.45:	coffee

11.00: 	Richard Aldrich (United Kingdom, University of Nottingham)
	 	GCHQ and Sigint in the Cold War

11.45:		Erich Schmidt-Eenboom (Germany, Forschungsinstitut f�ür
		The BND, German Military Forces and Sigint in the Cold War

12.30:	lunch

13.30:		Alf Jacobsen (Norway, NRK)
		Scandinavia, Sigint and the Cold War

14.15:		Cees Wiebes (Netherlands, NISA)
		The history of the WKC (Dutch NSA/GCHQ)

15.00:	Tea 

15.30:		Wies Platje (Netherlands, NISA)
		Dutch Sigint and the conflict with Indonesia, 1950 - 62

16.15:		Round Table discussion
		The importance of Sigint during the Cold War
17.00:	Closing Remarks + Reception

Since the number of seats is strictly limited to 100, you are requested to
submit your registration as soon as possible. Places will be attributed on
a first registered-first served basis. The conference rate is US $ 80
including lunch and drinks at the reception. Please register as quickly as
possible by sending an E-mail or letter to the honorary secretary of the
NISA, Dr. Cees Wiebes, at the following address:

Dr. Cees Wiebes
Honorary secretary NISA
P.O. Box 18 210
1001 ZC Amsterdam
The Netherlands

DIMACS Workshop on the Management of Digital IP

          DIMACS  Workshop on the Management of Digital IP

            April 17-18, 2000, Rutgers, New Jersey, USA

                         CALL FOR PARTICIPATION

Critical to the development of e-commerce is the management of digital
intellectual property (IP).  Technology has challenged the status quo of
IP management in many ways.  Widespread use of personal computers and
Internet communication creates vast opportunities for producers, distributors,
and consumers of digital works of all forms, but it also threatens to render
copying and modification of these works completely uncontrollable.  DIMACS
will sponsor a two-day series of technical talks and "position statements"
on the design, development, and deployment of IP-management technology that 
strikes the right balance between the need to control copying and modification 
and the desire to foster innovative uses of digital works that have been 
enabled by computing and communication advances.  

Speakers are encouraged to address all technical, legal, and business aspects 
of digital IP management.  Companies offering relevant products and services
are encouraged to participate and to submit abstracts or papers outlining 
their approach.

Topics appropriate for this workshop include, but are not limited to:

    * Intellectual property protection.
    * Anti piracy techniques.
    * Legal issues in the protection of digital rights.
    * New business models for managing digital rights.
    * Passive content protection, e.g. watermarking, tracing traitors.
    * Active content protection, e.g. software tamper resistance.
    * Hardware solutions to content protection.


                        INSTRUCTIONS FOR AUTHORS 

Authors are strongly encouraged to send their submission electronically.  
Authors unable to submit electronically are invited to send a cover letter 
and 4 copies of a submission (double-sided copies preferred) to the 
postal address below. Submissions must be received on or before 
January 17, 2000 (or postmarked by January 5, 2000, and sent via airmail 
or courier). The cover letter should contain the submission's title and 
the names and affiliations of the authors and should identify the contact 
author including e-mail and postal addresses.

Authors are invited to submit a one-page abstract or a full-length 
paper or position statement. 

(1) Abstract submissions should contain a title, list of authors, and
    an abstract describing the proposed talk.  The abstract should
    indicate whether the authors intend to submit a full-length paper
    in case the abstract is accepted.  

(2) Full-length submissions should begin with a title, list of authors, and
    a short abstract.  The introduction should summarize the
    contributions of the work at a level appropriate for a
    non-specialist reader. The submission should be at most 12 pages
    excluding the bibliography and clearly marked appendices, 
    using at least 11-point font and reasonable margins. The organizers do 
    not guarantee that they will read appendices; so submissions should be 
    intelligible without them.

Notification of acceptance or rejection will be sent to authors by 
February 14, 2000.

                          CONFERENCE PROCEEDINGS

We will decide whether to publish a proceedings for the workshop based on
the number of full-length submissions.  If the number and quality of
full-length submissions are sufficient, proceedings will be published
by the American Mathematical Society as a volume in the DIMACS series.

(1) Paul Kocher, Cryptography Research.
(2) Stuart Haber, InterTrust.
(3) Narayanan Shivakumar, Univ. Washington
(4) Jon Callas, Kroll-O'Gara

	SUBMISSION: January 17, 2000 
	ACCEPTANCE: February 14, 2000
	Pre-PROCEEDINGS VERSION: March 24, 2000

	Dan Boneh, Stanford University, USA
	Joan Feigenbaum, AT&T Labs -- Research
	Ramarathnam Venkatesan, Microsoft Research


	Dan Boneh, DIMACS workshop,
	Gates 475,
	Stanford, CA, 94304-9045
	Phone: (1) 650-725-3897    Fax:   (1) 650-725-4671

STIPENDS: A limited number of stipends are available to those unable
to obtain funding to attend the workshop.  Students giving talks
at the workshop are encouraged to apply if such assistance is
needed. Requests for stipends should be addressed to Joan Feigenbaum
at or 973 360-8442.

New Reports in the Theory of Cryptography Library

The library is currently located at .

LIST OF NEW PAPERS (June 15 -- October 1st, 1999)

99-14: I. Damgard, Concurrent Zero-Knowledge is Easy in Practice , June 
       1999. Revised July 1999. 

99-15: O. Goldreich, S. Goldwasser and S. Micali, Interleaved Zero-Knowledge 
       in the Public-Key Model , June 1999. Revised July 1999.

99-16: M. Bellare and S. Miner, A forward-secure digital signature scheme,
       July 1999.

99-17: V. Shoup, A composition theorem for universal one-way hash functions,
       July 1999.

99-18: M. Bellare and A. Sahai, Non-Malleable Encryption: Equivalence
       between Two Notions, and an Indistinguishability-Based Characterization,
       July 1999.

99-19: J. Hastad and M. Naslund, Security of all RSA and Discrete Log Bits,
       August 1999.

99-20: S. Micali and L. Reyzin, Improving the Exact Security of Digital 
       Signature Schemes, August 1999. 

99-21: M. Boyarsky, Public-Key Cryptography and Password Protocols: The 
       Multi-User Case, September 1999.

[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR