Tuesday, 23 August 2005
Session 1: Digital Business (1)
10.30- 12.30 Chair: Javier López
Welcome by the Programme Committee Chairs
Sec-Shield: Security Preserved Distributed Knowledge Management between Autonomous Domains
Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris
Protection Mechanisms against Phishing Attacks
Klaus Plößl, Hannes Federrath, and Thomas Nowey
Dropout-Tolerant TTP-Free Mental Poker
Jordi Castellà-Roca, Francesc Sebé, and Josep Domingo-Ferrer
A Self-healing Mechanism for an Intrusion Tolerance System
Bumjoo Park, Kiejin Park, and Sungsoo Kim
12.40 – 14.00 Lunch
Keynote TrustBus Conference
14.00 – 15.00 Chair: Günther Pernul
Privacy Enhanced Technology, Methods – Markets – Misuse
Invited Talk by Hannes Federrath, University of Regensburg
Session 2: Mobile / Wireless Services (1)
15.00 – 15.30 Chair: Günther Pernul
A Multilateral Secure Payment System for Wireless LAN Hotspots
Stephan Groß, Sabine Lein, and Sandra Steinbrecher
15.30 – 16.00 Coffee Break
Session 3A: Certificate Revocation / Index Search
16.00 – 17.00 Chair: Jinaying Zhou
Efficient Certificate Revocation System Implementation : Huffman Merkle Hash Tree (HuffMHT)
Jose L. Munoz, Jordi Forne, Oscar Esparza, and Manel Rey
Secure Index Search for Groups
Hyun-A Park, Jin Wook Byun, and Dong Hoon Lee
Session 3B: Trust (1)
16.00 – 17.00 Chair: Juan Gonzàles Nieto
Provision of Secure Policy Enforcement between Small and Medium Governmental Organizations
Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security
Ching Lin, Vijay Varadharajan, and Yan Wang
Wednesday, 24 August 2005
Session 4: Digital Signature
10.30 – 12.30 Chair: Jordi Forné
An Improved Group Signature Scheme
Jianhong Zhang, Jiancheng Zou, and Yumin Wang
Efficient Member Revocation in Group Signature Schemes
Eun Young Choi, Hyun-Jeong Kim, and Dong Hoon Lee
Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, and Filip Zagorski
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
Seung-Hyun Seo, Kyung-Ah Shim, and Sang-Ho Lee
12.30 - 14.00 Lunch
Session 5: Digital Business (2)
14.00 – 15.30 Chair: Christian Schläger
Protecting Online Rating System from Unfair Ratings
Jianshu Weng, Chunyan Miao, and Angela Goh
Anonynous Payment in a Fair E-Commerce Protocol with Verifiable TTP
Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, and Llorenç Huguet-Rotger
Designing Secure E-Tendering Systems
Rong Du, Ernest Foo, Juan Gonzalez Nieto, and Colin Boyd
15.30 - 16.00 Coffee Break
Session 6: Mobile / Wireless Services (2)
16.00 – 17.30 Chair: Torsten Priebe
Secure Group Communications over Combined Wired and Wireless Networks
Junghyun Nam, Seungjoo Kim, andDongho Won
A Privacy Enhancement Mechanism for Location Based Service Architectures using Transaction Pseudonyms
Oliver Jorns, Oliver Jung, Julia Gross, and Sandford Bessler
Making Money with Mobile Qualified Electronic Signatures
Heiko Rossnagel, Denis Royer
Thursday, 25 August 2005
Session 7: Privacy (2)
10.30 – 12.30 Chair: Hannes Federrath
Privacy Enforcement for IT Governance in Enterprises: Doing it for Real
Marco Casassa Mont, Robert Thyne, andPete Bramhall
An Adaptive Privacy Management System for Data Repositories
Marco Casassa Mont and Siani Pearson
Privacy Preserving Data Mining Services on the Web
Ayca Azgin Hintoglu, Yucel Saygin, Salima Benbernou, and Mohand Said Hacid
Reading your Keystroke: Whose Mail is it?
Sylvia Mercado Kierkegaard
12.30 – 14.00 Lunch
Session 8A: E-Auctions
14.00 – 15.30 Chair: Christoph Ruland
A Novel Construction of Two-party Private Bidding Protocols from Yao`s Millionaires Problem
Huafei Zhu and Feng Bao
An Improved Double Auction Protocol against False Bids
JungHoon Ha, Jianying Zhou, and SangJae Moon
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions
Glenn Robert Bewsell, Rodger Jamieson, Adrian Gardiner, and Deborah Bunker
Session 8B: Smart Cards / Authentication
14.00 – 15.30 Chair: Günther Pernul
A Secure Fingerprint Authentication System on an Untrusted Computing Environment
Yongwha Chung, Daesung Moon, Taehae Kim, and SungBum Pan
Security Enhancement for Password Authentication Schemes with Smart Cards
Eun-Jun Yoon, Woo-Hun Kim, and Kee-Young Yoo
Securing Operating System Services Based on Smart Cards
Luigi Catuogno, Roberto Gassira, Michele Masullo, and Ivan Visconti
15.30 – 16.00 Coffee Break
Session 9: Trust (2)
16.00- 17.00 Chair: Jianying Zhou
The Fuzzy and Dynamic Nature of Trust
Elizabeth Chang, Patricia Thompson, Tharam Dillon, and Farookh Hussain
Towards an Ontology of Trust
Lea Viljanen