[Cfrg] [CfP] Workshop on Trusted Computing in Distributed and Hybrid Systems
riccardo.lazzeretti@math.unipd.it Sat, 01 April 2017 21:58 UTC
Return-Path: <riccardo.lazzeretti@math.unipd.it>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77ED912947B for <cfrg@ietfa.amsl.com>; Sat, 1 Apr 2017 14:58:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Td1UP-xKDDSf for <cfrg@ietfa.amsl.com>; Sat, 1 Apr 2017 14:58:30 -0700 (PDT)
Received: from mailsrv.math.unipd.it (mailsrv.math.unipd.it [147.162.22.62]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59A3112947A for <cfrg@irtf.org>; Sat, 1 Apr 2017 14:58:29 -0700 (PDT)
Received: from server0.math.unipd.it (smtpout.math.unipd.it [147.162.22.54]) by mailsrv.math.unipd.it (8.15.2/8.15.2) with ESMTPS id v31LwJ0H047296 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <cfrg@irtf.org>; Sat, 1 Apr 2017 21:58:20 GMT
Received: from webmail.math.unipd.it (v0b1.math.unipd.it [147.162.22.157]) by server0.math.unipd.it (8.15.1/8.15.1) with ESMTPS id v31LwPTF035931 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <cfrg@irtf.org>; Sat, 1 Apr 2017 21:58:25 GMT
Received: from host80-120-dynamic.49-79-r.retail.telecomitalia.it (host80-120-dynamic.49-79-r.retail.telecomitalia.it [79.49.120.80]) by webmail.math.unipd.it (Horde Framework) with HTTPS; Sat, 01 Apr 2017 23:58:25 +0200
Date: Sat, 01 Apr 2017 23:58:25 +0200
Message-ID: <20170401235825.Horde.MFqM0mpa1h_fZnlpIxtfvd0@webmail.math.unipd.it>
From: riccardo.lazzeretti@math.unipd.it
To: cfrg@irtf.org
User-Agent: Horde Application Framework 5
Content-Type: text/plain; charset="utf-8"; format="flowed"; DelSp="Yes"
MIME-Version: 1.0
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-DCC--Metrics: server5.math.unipd.it 1480; Body=8 Fuz1=8 Fuz2=8
X-IMP-Checker: SpamAssassin on webmail.math.unipd.it/imp checker
X-Spam-Warning: SpamAssassin says this -probably- is not SPAM
X-Scanned-By: MIMEDefang 2.78
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/QWkrUNSMJBH11XJOADRPDWYvwYk>
Subject: [Cfrg] [CfP] Workshop on Trusted Computing in Distributed and Hybrid Systems
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Apr 2017 21:58:32 -0000
We apologize if you receive multiple copies of this CFP Workshop on Trusted Computing in Distributed and Hybrid Systems Co-located with the IEEE International Conference on Smart Computing (SMARTCOMP 2017) http://www.wnlabs.com/news/ATC_2017_workshop.php The two fundamental components of Trusted Computing, the asymmetric PKI framework and RSA IFC cryptography, are operating beyond their limitations and are no longer sufficient. "In August, 2015, NSA announced that it planned to transition in the not distant future to a new cipher suite that is resistant to quantum attacks." wikipedia Dynamic distributed key and hybrid systems overcome these limitations. THE TOPICS OF THIS WORKSHOP INCLUDE BUT ARE NOT LIMITED TO THE FOLLOWING · distributed frameworks for trusted computing and trusted cyber · PKI and distributed combined hybrid frameworks and security controls · security, identity and data provenance in distributed and hybrid systems · secure handshakes for distributed trusted computing · secure cryptographic key distribution and scalability for trusted computing and trusted cyber · side channel resistance in trusted computing and trusted cyber · next generation cryptography for trusted computing and trusted cyber · secure cryptographic key distribution and scalability for trusted computing and trusted cyber · trusted computing key creation for restricted resource environments i.e. IoT COMMITTEE · Chair: Andre Brisson - Whitenoise Laboratories Canada Inc. · Co-Chair: Dr. Mihai Sima - University of Victoria, British Columbia ECE Labs · Program Committee Chair: Layton Perrin - Sequor Systems Inc. · Program Committee member: Dr. Issa Traore - University of Victoria, British Columbia ECE Labs · Program Committee member: Laurie Perrin - Sequor Systems Inc. · Program Committee member: Albert Meyburgh - British Columbia Institute of Technology · Program Committee member: Edouard Kujawski - MIT, Lawrence Berkeley National Labs · Program Committee member: Sam Greenblatt, former CTO HP, Dell SUBMISSION Workshop papers are limited to 6 pages following the IEEE proceedings format, and are to be submitted as PDF via the ATC 2017 submission site: ATC 2017 submission Select CyberTrust track after logging in. Deadlines · Paper Submission - April 10, 2017 · Acceptance Notification - May 10, 2017 · Camera-Ready Submission - June 10, 2017
- [Cfrg] [CfP] Workshop on Trusted Computing in Dis… riccardo.lazzeretti