*******************************************************************

			CALL FOR PARTICIPATION
		     Including Technical  Program

                           SecureComm 2006

      Second International Conference on Security and Privacy for
			Communication Networks

		 Radisson Plaza Lord Baltimore Hotel
	      Baltimore, MD, USA, Aug. 28 - Sep. 1, 2006

                    URL: http://www.securecomm.org

                           CO-SPONSORED BY:
             IEEE Communications Society (www.comsoc.org)
                    CreateNet (www.create-net.it)

		    In Cooperation with ACM SIGSAC

		Early Registration Ends August 1, 2006
*******************************************************************

The scope of Securecomm 2006 has been broadened since the inaugural
2005 event. Topics of interest encompass research advances in ALL
areas of secure communications and networking. 

Securecomm aims to bring together security and privacy experts in
academia, industry and government as well as practitioners, standards
developers and policy makers.  Securecomm also serves as a venue for
learning about state-of-the-art in security and privacy
research. Presentations reporting on cutting-edge research results are
supplemented by panels on controversial issues and invited talks on
timely and important topics.

For information regarding the conference, please visit
http://www.securecomm.org or contact one of the Chairs below.

*******************************************************************

			  TECHNICAL PROGRAM

TUESDAY, August 29:

08:30 - 09:00	Introduction and Welcome

09:00 - 10:00	Keynote Talk, Dr. Charles Palmer, IBM; 
		Title: "An(other) Inconvenient Truth" 

10.15 - 12:00 	Session 1: INTRUSION DETECTION and DoS

    * A Flexible Approach to Intrusion Alert Anonymization and
Correlation
          Dingbang Xu, Peng Ning

    * An Intelligent Infrastructure Strategy to Improving the
      Performance and Detection Capability of Intrusion Detection
      Systems
            Emmanuel Hooper

    * Framework for Identifying Compromised Nodes in Sensor Networks
          Qing Zhang, Ting Yu, Peng Ning

    * Denial of Service Attacks and Defenses in Decentralized Trust
Management
          Ninghui Li, Jiangtao Li, XiaoFeng Wang, Ting Yu

01:30 - 03:15 	Session 2: WORMS and VIRUSES

    * An Architecture for an Email Worm Prevention System
          Mohamed Taibah, Ehab Al-Shaer

    * Distributed Stealthy Coordination Mechanism for Worm
Synchronization
          Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya
Krishnan,
	  Adrian Perrig

    * Effective Detection of Active Worms with Varying Scan Rate
          Wei Yu, Xun Wang, Dong Xuan, David Lee

    * On Mobile Viruses Exploiting Messaging and Bluetooth Services
         Abhijit Bose, Kang G. Shin

03:30 - 05:15 	Session 3: AD HOC NETWORKS:

    * Discount Anonymous On Demand Routing for Mobile Ad hoc Networks
          Liu Yang, Markus Jakobsson, Susanne Wetzel

    * In-Band Wormholes and Countermeasures in OLSR Networks
          Peter Kruus, Dan Sterne, Richard Gopaul, Michael Heyman, Brian
	  Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie
Ivanic,
	  Geoff Lawler 

    * Detecting the Sybil Attack in Ad hoc Networks
          Clay Shields, Chris Piro, Brian N. Levine

    * Enhancing Benign User Cooperation in the Presence of Malicious
      Adversaries in Ad Hoc Networks 
            George Theodorakopoulos, John Baras

07:00 - 09:00:   Demo and Poster Session:

DEMOS:

Mobipot, Takehiro Takahashi

Policy Machine Demonstration, David Ferraiolo

Bootstrapping for MIPv6, Vishnu Ram

Electromagnetic Signatures of WLAN Cards: Identification of Cards in
the Presence of an Interferer, Kate Remley and Bob Johnk

PSELS: Practical Secure Email Lists Services, Himanshu Khurana, Jin
Heo and Meenal Pant 

Pvault: A Client Server System Providing Mobile Access to Personal Data,
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian

POSTERS:

Collaborative Location Certification for Sensor Networks, Sol Lederer

Physical Layer Information Assurance Enhancement Using Phased Arrays,
Joe Carey

Enhancing Privacy Preservation of Anonymous Location Sampling
Techniques in Traffic Monitoring Systems, Baik Hoh, Marco Gruteser

Security in Mobile Ad hoc Networks, G.V.S.Raju

A Centralized Group Rekeying Scheme for Secure Group Communication in
Wireless Sensor Networks, Yong Wang and Byrav Ramamurthy

---------------- DAY 2 ---------------------

WEDNESDAY, August 30:

09:00 - 10:00:	Invited Talk, Mr. Brian Snow, Title: "We Need Assurance"


10.15 - 12:00   Session 4: APPLIED CRYPTO + CODING

    * An Identity-based Ring Signature Scheme with Enhanced Privacy
          Chandana Gamage, Ben Gras, Andrew Tanenbaum, Bruno Crispo

    * Implementation and Performance Evaluation of EAP-TLS-KS
          Jared Cordasco, Ulrike Meyer, and Susanne Wetzel

    * Provably Secure Ubiquitous Systems: Universally Composable RFID
      Authentication Protocols 
          Mike Burmester, Tri van Le, Breno de Medeiros

    * Packet coding for strong anonymity in ad hoc networks
          Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux

01:30 - 03:15	Session 5: MALICIOUS TRAFFIC

    * Protecting Against Distributed Denial of Service (DDoS) Attacks
      Using Distributed Filtering  
            Jonathan Trostle 

    * A Double Horizon Defense Design for Robust Regulation of
      Malicious Traffic 
            Ying Xu, Roch Guerin

    * TOPO: A Topology-aware Single Packet Attack Traceback Scheme
          Linfeng Zhang, Yong Guan

    * On filtering of DDoS attacks based on source address prefixes
          Cristian Estan, Gary Pack, Jaeyoung Yoon, Eli Collins

03:30 - 05:15	Session 6: Network Security I:

    * Preventing Cross Site Request Forgery Attacks
          Nenad Jovanovic, Christopher Kruegel, Engin Kirda
    
    * DaTA -- Data Transparent Authentication without Communication
Overhead
          Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia

    * Attacking Mobile Phones by Exploiting Emerging Vulnerabilities
      in Cellular Data Services 
          Hao Chen, Denys Ma, Radmilo Racic

    * MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop
      Wireless Networks 
          Issa Khalil, Saurabh Bagchi, Ness Shroff
 
06:30 - 08:00	Conference Reception

---------------- DAY 3 ---------------------

THURSDAY, August 31:

08:30 - 10:00	PANEL 

TITLE: Achieving Practical Private Information Retrieval

CHAIR: Radu Sion (SUNY, Stony Brook)

PANELISTS: Aggelos Kiayias (Univ. of Connecticut), Giovanni Di
	   Crescenzo (Telcordia), William Gasarch (Univ. of Maryland)
and Moti
	   Yung (RSA, Inc. and Columbia Univ.)

10:15 - 12:00	Session 7:  Network Security II:

    * Leveraging IPsec for Mandatory Access Control Across Systems
          Trent Jaeger, Dave King, Kevin Butler, Serge Hallyn, Joy
          Latten, Xiaolan Zhang 

    * Enabling Confidentiality in Content-Based Publish/Subscribe
      Infrastructures 
            Costin Raiciu, David Rosenblum

    * Non-Invasive Methods for Host Certification
	   Patrick Traynor, Michael Chien, Scott Weaver, Boniface
	   Hicks, Patrick McDaniel  

    * Secure Real-time User Preference Collection for Broadcast
Scheduling
          Xuhua Ding, Baihua Zheng, Shuhong Wang

01:00 - 02:45	Session 8: SENSOR and CELLULAR NETWORKS:

    * Message Dropping Attacks in Overlay Networks: Attack Detection
      and Attacker Identification 
            Liang Xie, Sencun Zhu

    * How to Design Connected Sensor Networks that are Provably Secure
          Roberto Di Pietro, Luigi Mancini, Alessandro Mei, Jaikumar
          Radhakrishnan, Alessandro Panconesi

    * Distributed Authentication of Program Integrity Verification in
      Wireless Sensor Networks 
          Katharine Chang, Kang G. Shin

    * Towards More Efficient Distance Bounding Protocols for Use in
      Sensor Networks 
          Catherine Meadows, Paul Syverson, LiWu Chang 

END OF CONFERENCE

Workshops will be held on Monday, August 28 and September 1 (Friday)

*******************************************************************

		   CONFERENCE ORGANIZING COMMITTEE

General Co-Chairs
-----------------

Mukesh Singhal, University of Kentucky, singhal@cs.uky.edu
John Baras, University of Maryland, College Park, baras@isr.umd.edu

Technical Program Co-Chairs
---------------------------

Steve Kent, BBN, kent@bbn.com
Gene Tsudik, UC Irvine,  gts@ics.uci.edu

Workshops Chair
---------------

G. Manimaran, Iowa State University, gmani@iastate.edu

Panels Co-Chairs
----------------

Bruno Crispo, Vrije Universiteit, Netherlands, crispo@few.vu.nl
Avishai Wool, Technion, Israel, yash@eng.tau.ac.il

Research Demos/Exhibits Chair
-----------------------------

Tom Karygiannis, NIST, karygiannis@nist.gov

Sponsorships Chair
------------------

Byrav Ramamurthy, University of Nebraska, Lincoln, byrav@cse.unl.edu

Publicity Co-Chairs
-------------------

Peng Liu, Penn State University, pliu@ist.psu.edu
Cristina Nita-Rotaru, Purdue University, crisn@cs.purdue.edu

Publication Chair
-----------------

Farooq Anjum, Telcordia Technologies, fanjum@telcordia.com

Steering Committee:
-------------------

 Imrich Chlamtac (Chair), Create-Net
 Krishna M. Sivalingam (Co-Chair), University of Maryland, Baltimore
County
 Gene Tsudik, University of California, Irvine
 Brian Bigalke,  (Staff Liaison, IEEE Communications Society)

		   TECHNICAL PROGRAM COMMITTEE
		   ---------------------------

 N. Asokan	        Nokia Research			    
 Giuseppe Ateniese	Johns Hopkins University	    
 Tuomas Aura		Microsoft Research		    
 Dirk Balfanz		PARC				    
 Bharat Bhargava	Purdue				    
 Matt Bishop		University of California, Davis	    
 Levente Buttyan	Budapest University of Technology   
 Srdjan Capkun		Technical University of Denmark	    
 Claude Castelluccia	Inria Rhone-Alpes		    
 Tom Chen		Southern Methodist University	    
 Bruno Crispo		Vrije Universitet 		    
 Breno de Medeiros	University of Central Florida	    
 Robert Deng		Singapore Management University	    
 Xuhua Ding		Singapore Management University	    
 Glenn Durfee		PARC				    
 Bao Feng		Institute for Infocomm Research	    
 Dieter Gollmann	Technical University of Hamburg-Harb
 Richard Han		University of Colorado at Boulder
 Tom Karygiannis	NIST				    
 Yongdae Kim		University of Minnessota	    
 Christopher Kruegel	Technical University of Vienna	    
 Kwok-Yan Lam		Tsinghua University		    
 Brian LaMacchia	Microsoft			    
 Carl Landwehr		University of Maryland
 Wenke Lee		Georgia Tech			    
 Albert Levi		Sabanci University,		    
 Ninghui Li		Purdue				    
 Peng Liu		Pennsylvania State University	    
 Luigi Mancini		Unversity of Rome - La Sapienza	    
 Fabio Massacci		University of Trento		    
 Ludovic Me'		Supelec				    
 Pietro Michiardi	Eurecom Institute		    
 Refik Molva		Eurecom Institute		    
 Mats Naslund		Ericsson Research		    
 Pekka Nikander		Ericsson Nomadiclab		    
 Cristina Nita-Rotaru	Purdue				    
 Radha Poovendran	University of Washington	    
 Byrav Ramamurthy	University of Nebraska-Lincoln	    
 Michael Roe		Microsoft Research		    
 Sanjeev Setia		George Mason University		    
 Cliff Wang		Army Research Laboratory	    
 Helen Wang		Microsoft Research		    
 Ron Watro		BBN				    
 Dirk Westhoff		NEC Research			    
 Susanne Wetzel		Stevens Institute of Technology	    
 Avishai Wool		Tel Aviv University		    
 Shouhuai Xu		University of Texas, San Antonio    
 Xiaowei Yang		University of California, Irvine    
 Bulent Yener 		Rensselauer Polytechnic Institute   
 Jeong Hyun Yi		Samsung Advanced Institute of Technology
 Jianying Zhou		Institute for Infocomm Research	    
 Alf Zugenmaier		DoCoMo Labs                         

************************************************