SIGINT in Europe During the Cold War
More and more students of the Cold War begin to realize that the intelligence communities played an important role during the Cold War. In recent years in particular the importance of Signals Intelligence (SIGINT) has been stressed and especially the capabilities and possibilities of reading and deciphering diplomatic, military, commercial and other Communications of other nations. This growing awareness of the importance of intelligence applies not only to the activities of the big services but also to those of the smaller nations like for example the Netherlands. For this exact reason a couple of years ago the Netherlands Intelligence Studies Association (NISA) was established in which academics and (former and still active) members of the Netherlands intelligence community work together in order to promote research into the history of Dutch intelligence communities. This growing interest had led in Holland to publications dealing with the history of the Dutch internal security service (1995), the Dutch Navy Intelligence (1997) and the Netherlands foreign intelligence service (November 1998). As honorary secretary of the NISA it is my pleasure to announce that the NISA will host an international conference dealing with THE IMPORTANCE OF SIGINT IN WESTERN EUROPE IN THE COLD WAR This conference with a particular emphasis on Sigint and the Northwestern European nations will take place on Saturday November 27 in Amsterdam. The line up of the program is as follows: SPEAKERS: 09.45: Opening of the Conference and Welcome to the speakers and participants 10.00: Matthew Aid (United States, historian) Introduction on the importance of SIGINT in the Cold War 10.45: coffee 11.00: Richard Aldrich (United Kingdom, University of Nottingham) GCHQ and Sigint in the Cold War 11.45: Erich Schmidt-Eenboom (Germany, Forschungsinstitut f�ür Friendenspolitik) The BND, German Military Forces and Sigint in the Cold War 12.30: lunch 13.30: Alf Jacobsen (Norway, NRK) Scandinavia, Sigint and the Cold War 14.15: Cees Wiebes (Netherlands, NISA) The history of the WKC (Dutch NSA/GCHQ) 15.00: Tea 15.30: Wies Platje (Netherlands, NISA) Dutch Sigint and the conflict with Indonesia, 1950 - 62 16.15: Round Table discussion The importance of Sigint during the Cold War 17.00: Closing Remarks + Reception Since the number of seats is strictly limited to 100, you are requested to submit your registration as soon as possible. Places will be attributed on a first registered-first served basis. The conference rate is US $ 80 including lunch and drinks at the reception. Please register as quickly as possible by sending an E-mail or letter to the honorary secretary of the NISA, Dr. Cees Wiebes, at the following address: Dr. Cees Wiebes Honorary secretary NISA P.O. Box 18 210 1001 ZC Amsterdam The Netherlands E-mail: WIEBES@PSCW.UVA.NL
DIMACS Workshop on the Management of Digital IP
DIMACS Workshop on the Management of Digital IP April 17-18, 2000, Rutgers, New Jersey, USA CALL FOR PARTICIPATION Critical to the development of e-commerce is the management of digital intellectual property (IP). Technology has challenged the status quo of IP management in many ways. Widespread use of personal computers and Internet communication creates vast opportunities for producers, distributors, and consumers of digital works of all forms, but it also threatens to render copying and modification of these works completely uncontrollable. DIMACS will sponsor a two-day series of technical talks and "position statements" on the design, development, and deployment of IP-management technology that strikes the right balance between the need to control copying and modification and the desire to foster innovative uses of digital works that have been enabled by computing and communication advances. Speakers are encouraged to address all technical, legal, and business aspects of digital IP management. Companies offering relevant products and services are encouraged to participate and to submit abstracts or papers outlining their approach. Topics appropriate for this workshop include, but are not limited to: * Intellectual property protection. * Anti piracy techniques. * Legal issues in the protection of digital rights. * New business models for managing digital rights. * Passive content protection, e.g. watermarking, tracing traitors. * Active content protection, e.g. software tamper resistance. * Hardware solutions to content protection. WORKSHOP URL: http://crypto.stanford.edu/DIMACS/ INSTRUCTIONS FOR AUTHORS Authors are strongly encouraged to send their submission electronically. Authors unable to submit electronically are invited to send a cover letter and 4 copies of a submission (double-sided copies preferred) to the postal address below. Submissions must be received on or before January 17, 2000 (or postmarked by January 5, 2000, and sent via airmail or courier). The cover letter should contain the submission's title and the names and affiliations of the authors and should identify the contact author including e-mail and postal addresses. Authors are invited to submit a one-page abstract or a full-length paper or position statement. (1) Abstract submissions should contain a title, list of authors, and an abstract describing the proposed talk. The abstract should indicate whether the authors intend to submit a full-length paper in case the abstract is accepted. (2) Full-length submissions should begin with a title, list of authors, and a short abstract. The introduction should summarize the contributions of the work at a level appropriate for a non-specialist reader. The submission should be at most 12 pages excluding the bibliography and clearly marked appendices, using at least 11-point font and reasonable margins. The organizers do not guarantee that they will read appendices; so submissions should be intelligible without them. Notification of acceptance or rejection will be sent to authors by February 14, 2000. CONFERENCE PROCEEDINGS We will decide whether to publish a proceedings for the workshop based on the number of full-length submissions. If the number and quality of full-length submissions are sufficient, proceedings will be published by the American Mathematical Society as a volume in the DIMACS series. CONFIRMED SPEAKERS: (1) Paul Kocher, Cryptography Research. (2) Stuart Haber, InterTrust. (3) Narayanan Shivakumar, Univ. Washington (4) Jon Callas, Kroll-O'Gara DATES: SUBMISSION: January 17, 2000 ACCEPTANCE: February 14, 2000 Pre-PROCEEDINGS VERSION: March 24, 2000 ORGANIZING COMMITTEE: Dan Boneh, Stanford University, USA Joan Feigenbaum, AT&T Labs -- Research Ramarathnam Venkatesan, Microsoft Research ADDRESS FOR ELECTRONIC SUBMISSIONS: firstname.lastname@example.org ADDRESS FOR NON-ELECTRONIC SUBMISSIONS: Dan Boneh, DIMACS workshop, Gates 475, Stanford, CA, 94304-9045 U.S.A Phone: (1) 650-725-3897 Fax: (1) 650-725-4671 E-mail: email@example.com STIPENDS: A limited number of stipends are available to those unable to obtain funding to attend the workshop. Students giving talks at the workshop are encouraged to apply if such assistance is needed. Requests for stipends should be addressed to Joan Feigenbaum at firstname.lastname@example.org or 973 360-8442.
New Reports in the Theory of Cryptography LibraryThe library is currently located at http://philby.ucsd.edu/cryptolib/ .
=========================================================================== LIST OF NEW PAPERS (June 15 -- October 1st, 1999) 99-14: I. Damgard, Concurrent Zero-Knowledge is Easy in Practice , June 1999. Revised July 1999. 99-15: O. Goldreich, S. Goldwasser and S. Micali, Interleaved Zero-Knowledge in the Public-Key Model , June 1999. Revised July 1999. 99-16: M. Bellare and S. Miner, A forward-secure digital signature scheme, July 1999. 99-17: V. Shoup, A composition theorem for universal one-way hash functions, July 1999. 99-18: M. Bellare and A. Sahai, Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization, July 1999. 99-19: J. Hastad and M. Naslund, Security of all RSA and Discrete Log Bits, August 1999. 99-20: S. Micali and L. Reyzin, Improving the Exact Security of Digital Signature Schemes, August 1999. 99-21: M. Boyarsky, Public-Key Cryptography and Password Protocols: The Multi-User Case, September 1999.
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR