Keynote Speaker (I)

Associate Professor Lejla Batina
Institute for Computing and Information Sciences (iCIS) 
Radboud University Nijmegen,
The Netherlands

Keynote Title:

Near-field privacy


With the expansion of various privacy-sensitive RFID applications a clear need for new identification schemes has been established. In the past few years a plenitude of identification protocols has been proposed addressing different real-life scenarios and relying on both symmetric-key and asymmetric-key cryptography.

In this talk we first survey some prominent solutions for privacy-sensitive RFID identification protocols and discuss their properties and hardware requirements. In the second part of this talk we discuss some recent work on privacy-friendly attribute matching.

Brief Biography

Lejla Batina is an associate professor at Radboud University Nijmegen, The Netherlands. She received her M.Sc. degree in Mathematics from the University of Zagreb, Croatia in 1995 and Ph.D. degree in engineering from the K.U. Leuven in 2005. She also studied and worked as a research assistant at the Technical University of Eindhoven, The Netherlands from 1999 to 2001. Her research interests include efficient arithmetic for cryptographic algorithms, secure implementations of cryptographic algorithms, side-channel security, lightweight cryptography e.g. crypto for RFIDs, sensor net works, etc.

Keynote Speaker (II)

Associate Professor 
Jinqiao Shi
Director of Cyber Threat Detection and Data Protection,
National Engineering Laboratory for Information Security Technologies, P.R. China

Institute of Information Engineering (IIE), 
Chinese Academy of Science (CAS), P.R. China

Keynote Title:

Towards Protecting Service Accessibility of Anonymous Communication Systems: Catch Me if You Can!


Nowadays, Internet has become an important infrastructure for human society, and the security and privacy issues on Internet have drawn significant attention from both industries and governments. Service accessibility is one of the most basic and important requirements for Internet services, which means the ability to access and benefit from some system or entity. With more and more real world access-denial attacks against Internet service such as Internet censorship, service accessibility under attack has become one severe security threat on Internet, which has aroused wide interests from individuals, researchers, commercial companies and even governments.

Recent advances in research and practice have been made it possible to win the battle between attack and protection of Internet service accessibility. In this talk, we will take anonymous communication systems as an example and present the cat-and-mouse games between the attacker and defender of service accessibility. We will introduce the general model on network service accessibility, give a thorough analysis of related work on the key procedures of accessibility confrontation, and discuss the future of service accessibility.

Brief Biography

Dr Jinqiao Shi is the director of Cyber Threat Detection and Data Protection in National Engineering Laboratory for Information Security Technologies (China), and an associate professor/PhD supervisor at Institute of Information Engineering, Chinese Academy of Sciences (IIE, CAS). He received his Ph.D. from Harbin Institute of Technology in 2007. 

His research interests include network security and privacy, digital forensics, intrusion detection and protection, network measurement, and etc. Currently his research is supported by National Natural Science Foundation of China (NSFC), National High-tech R&D Program of China (863 Program), and Strategic Priority Research Program of Chinese Academy of Sciences, etc.

He holds more than 10 patents, and has published more than 50-refereed academic papers in journals and conferences such as IEEE Journal on Selected Areas in Communications, IEEE ICCCN, IEEE ISCC, IEEE ICC and ISC, and won the best paper award once. He is also an executive member of Youth Innovation Promotion Association, Chinese Academy of Sciences.