dcypher.nl

U bent hier

dcypher verenigt onderzoekers, docenten, producenten, gebruikers en beleidsmakers in Nederland om kennis en kunde over cyberveiligheid te verbeteren

De ministeries van Veiligheid en Justitie , Economische Zaken, Onderwijs Cultuur en Wetenschap en de Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO), gebied Exacte Wetenschappen (EW) zijn initiatiefnemers van het Nederlandse Cybersecurity Platform voor Hoger Onderwijs en Onderzoek. 

Actueel

 For 64 master students or students in the final year of a Bachelor’s degree in a Science or Social Science the National Cyber Security Summer School, NCS3 takes place between August 22 and 26th in the Hague, Rotterdam, Delft and Amsterdam. The NCS3 is an initiative of the Dutch Cyber Security Council (CSR) and is organized by dcypher with the support from CGI Group, Nederland-ICT, TNO, the National Cyber Security Centre, Leiden University, TU Delft, and several other organizations.   During the NCS3, attendees receive lectures from leading experts from academia, private sector and public sector, company and organization visits, a Hands on Hack-lab, a Crisis Simulation, and a Dark-Web training. They will also get the opportunity to compete with their peers on presenting an advice, where the winners will be pitching to the Dutch Cyber Security Council, and will be offered a prize by the NCS3 partners. The evening program of the NCS3 includes networking drinks and dinner, a match-making event, and several other opportunities to meet with their peers.  The 64 NCS3 attendees with Dick Schoof, Elly van den Heuvel, Jan Piet Barthel and Nicolas Castellon Want to know more about the NCS3? Visit  www.ncs3.nl   
Cryptographers Léo Ducas from the Centrum Wiskunde & Informatica (CWI) and Peter Schwabe (Radboud University) have won the 2016 Internet Defense Prize. They were awarded the prize with their co-authors Erdem Alkim (Ege University, Turkey) and Thomas Pöppelmann (Infineon Technologies AG, Germany) for their paper 'Post-Quantum Key Exchange – A New Hope'. The prize was awarded on 10 August 2016 at the 25th USENIX Security Symposium in Austin, Texas. Facebook created the Internet Defense Prize in 2014 through a partnership with USENIX. It consists of 100,000 dollars. "The information security industry is in a race against time to innovate faster than the adversaries who wish to harm consumers and businesses", Facebook writes. "However, most security research over-rotates toward offensive, novelty hacks that have little impact on most people's lives". To turn the incentive around, the Internet Security Prize is designed to reward researchers who combine a working prototype with significant contributions to the security of the Internet—particularly in the areas of protection and defense. Post-quantum securityThe winning team proposed an improved cryptosystem, called 'NewHope', that is designed to resist attacks by future quantum computers. Such quantum computers would have a devastating impact on the security of our current protocols – an advent sometimes referred as a Cryptocalypse. NewHope can for example be integrated into TLS and HTTPS, two security protocols used by web-browsers. This was recently done by Google, as an experiment toward post-quantum security, and this was featured in Wired. While other proposal for post-quantum security have been made previously, Facebook says: "Building on previous studies, this new research identified a better suited error distribution and reconciliation mechanism, analyzed the scheme's hardness against attacks by quantum computers, and identifies a defense against possible backdoors and all-for-the-price-of-one attacks. Using these measures the team was able to increase the security parameter by more than 100 percent, reduce the communication overhead by more than half, and significantly increase computation speed in portable C implementation and current Intel CPUs, all while protecting against timing attacks". Léo Ducas is working in the Cryptology group at Centrum Wiskunde & Informatica (CWI) in Amsterdam, headed by Ronald Cramer. Ducas was recently awarded a Veni grant. Peter Schwabe is working at Radboud University in Nijmegen. The research has been partly funded by an NWO Free Competition Grant and by a Public-Private Partnership between CWI and NXP Semiconductors. https://www.cwi.nl/news/2016/scientists-netherlands-win-2016-internet-defense-prize-newhope
14 October 2016 Zuiderstrandtheater The Hague (free parking/ free shuttle buses)During the 2016 ‘Alert Online’ period, the Dutch governmental campaign for cybersecurity awareness, a Cybersecurity Matchmaking event is held. Reasons to organize this event are the upcoming third national cybersecurity research tender (funded by the Netherlands Organisation for Scientific Research (NWO), the taskforce SIA, the Ministry of Security and Justice and the Internal Security Fund of the European Union, executed by NWO and SIA) and the desire to identify improvements in cybersecurity higher education, to better match the needs of the public and private sector.  Who should attend?The event is for everyone, interested or involved in cybersecurity research, development, innovation and education. We invite especially those interested in participation in possible future cybersecurity R&D or education projects (scientists, students, entrepreneurs), public and private research partners, potential profit and non-profit users of research project results, teachers of fundamental and applied cybersecurity and policy makers. ResearchJoin our event if you consider participation in the next national cybersecurity SBIR* call and/or NWO long-term research call and you look for contacts e.g. to realize a joint research project proposal, and get an understanding of terms and conditions associated with the application process of the third cybersecurity tender. EducationIf you are interested in closing the gaps between job profiles and cybersecurity curricula and have ideas to optimise cybersecurity (higher) education and you like to make (first) contacts to share ideas, suggestions, best practices, educational challenges this matchmaking event is the place! Find out more Register here Note: in a later stage you will receive an email to extend your registration with specific information in order to get your visit customised. OrganisationThe Matchmaking Cybersecurity is organised by the Netherlands Enterprise Agency (RvO), the National Cyber Security Centre (NCSC), Taskforce SIA and the Netherlands Organisation for Scientific Research (NWO) in close cooperation with the dcypher (dutch cybersecurity platform for higher education and research)in conjunction with AlertOnline.  Background infoThe Ministry of Security and Justice, the Internal Security Fund of the European Union, the Netherlands Organisation for Scientific Research (NWO), and the taskforce SIA all contribute financially to the (third) funding round of (multidisciplinary) cybersecurity research, within the framework of the National Cyber Security Research Agenda (NCSRA-II). The national tender will again include a call for long-term, more fundamental research, and a call for applied R&D for medium-term R&D (SBIR). The SBIR is funded by the Ministry of Security and Justice and the Internal Security Fund of the European Union. The objective is to develop a Dutch cybersecurity higher education (HBO and WO) Agenda and to get a closer connection between cybersecurity research and education. *   

Nieuws

Assistant/Associate Professor of Privacy Engineering (Tenure Track) (0,8 - 1,0 fte) Faculty of Science Maximum salary: € 4,691 gross/month Vacancy number: 62.19.16 Application deadline: 15 September 2016 ResponsibilitiesAs an Assistant or Associate Professor at the Institute for Computing and Information Sciences (iCIS) your tasks will include research, education, valorisation, organisation, and recruiting new students.   Research In line with the institute’s current research, you will carry out research in the field of privacy engineering, which includes the following topics:integration of law and policy compliance into the development process;privacy impact assessment, privacy risk management models and accountability;technical standards, heuristics and best practices for privacy engineering;user privacy and data protection requirements, especially in big data analysis;privacy preserving data mining;privacy architectures, and privacy validation and evaluation methods and tools;organisational, legal, political and economic aspects of privacy engineering.  You will act as a daily supervisor of PhD candidates, and will regularly publish scientific articles about the results of your own research and about developments in the field in international journals and proceedings. In addition, you will disseminate results in the field to a wider audience, including professionals, policy makers, journalists and the public at large. You will actively acquire external research funding from commercial and non-commercial sources.   Education You will teach the Bachelor's course in Requirement Engineering and the Master’s course in System Approaches to Organization & Information and will supervise Master’s thesis projects, particularly in Information Science, but possibly also in Computing Science.   Valorisation You will turn scientific knowledge into economical and societal value through:industrial or societal applications of research results;contributions to societal discussions;outreach in different media. Organisation One of your main organisational tasks will be to coordinate the Master’s programme in Information Science. This will include:being the programme coordinator for this Master’s programme for five years;developing international contacts, cooperation, and exchange opportunities, for students, but also for staff members within the programme;recruiting new students, in order to have a viable Master’s programme. Work environmentYou will join a vibrant and growing institute, consistently ranked as the top Computer Science department in the Netherlands (National Research Review Computer Science 2002-2008 and 2009-2014). You will benefit from a rich academic environment with many links to other disciplines and industry. The post fits most naturally within the Digital Security section (DiS), but excellent applicants with a background in Data Science (DaS) or Software Science (SwS) are also encouraged to apply. What we expect from youResearch: a PhD degree in a relevant area (computer science or a cognate discipline); international academic publications in the field of privacy engineering (for example on one of the following subjects Architectural Design, Requirements Engineering, Software Product Quality Improvement, Software Development Methodology, Software Analysis, Software Security, Software Metrics and Software Testing, Data Mining, or Machine Learning); some experience with (successfully) applying for external funding; ability to develop an independent line of research; Teaching: outstanding teaching skills and at least some teaching experience, and a clear vision on teaching; a Dutch university teaching qualification (BKO), or an equivalent qualification, or the clear intention to acquire one; ability to teach in English, and to teach in Dutch within two years; Communication skills: excellent communication skills towards colleagues, students, and non- experts; Multidisciplinary collaboration: eagerness to build a bridge between the ongoing research on security/privacy and data science within iCIS, and to collaborate with researchers and colleagues at the Nijmegen School of Management. What we have to offeremployment: 0,8 - 1,0 fte;a maximum gross monthly salary of € 4,691 based on a 38-hour working week (salary scale 11);in addition to the salary: an 8% holiday allowance and an 8.3% end-of-year bonus;duration of the contract: 6 years;at the start of the tenure track you will be appointed as Assistant Professor, level 2 (salary scale 11). In case of a positive evaluation at the end of your tenure track you will be permanently appointed as Assistant Professor, level 1 (salary scale 12). In case of a more senior candidate, an Associate Professor (salary scale 13-14) profile may be applicable.Are you interested in our excellent employment conditions? Other InformationRadboud University is an equal opportunity employer, committed to building a culturally diverse intellectual community, and as such encourages applications from women and minorities. Would you like to know more?Further information on: Institute for Computing and Information Sciences (iCIS) For more information about this vacancy, please contact: Prof.dr.ir. A.P. de Vries Telephone: +31 24 365 2354 E-mail: a.devries@cs.ru.nl Are you interested?You should upload your application (attn. of Ms W. van der Pluijm) exclusively using the button 'Apply' below. Your application should include (and be limited to) the following attachment(s):CVletter of motivationresearch statementeducation statementFor more information on your application: +31 24 3652131. http://www.ru.nl/english/working-at/job-opportunities/details/apply/?tk=uk&recid=585459
De Amerikaanse veiligheidsdienst lijkt te zijn bestolen van eigen spionagegereedschap. Drie jaar na ‘Snowden’ staat de Amerikaanse veiligheidsdienst National Security Agency (NSA) opnieuw in zijn hemd. Een groep hackers zegt de geavanceerde cyberwapens gestolen te hebben waarmee de NSA zelf inbreekt op andere computers. Afgelopen weekend werd het gestolen materiaal op een anonieme veiling aangeboden. Veiligheidsexperts achten de claim – een deel van de software is als bewijsmateriaal publiek gemaakt – authentiek. Ook Edward Snowden, de klokkenluider die zelf in 2013 een stapel NSA-presentaties publiek maakte, acht het geloofwaardig dat de NSA gehackt is. „De NSA is niet onkwetsbaar – onze rivalen doen hetzelfde als wat wij doen (inbreken op computers, red) en af en toe slagen ze daarin.” Wat wel nieuw is, benadrukt Snowden, is dat na een geslaagde computerinbraak zo nadrukkelijk de publiciteit gezocht wordt. Snowden suggereert in een serie twitter-berichten dat de inbraak gepleegd kan zijn op een server die de NSA als tussenstation gebruikte om vijandelijke aanvallen te detecteren en zelf in te breken bij anderen. Hij vermoedt Russische betrokkenheid en zelfs een link met de hack van de Amerikaanse Democratische partij, eind juli. Hackers braken toen in op de servers van de politieke partij. Ook die hack werd toegeschreven aan Rusland. Equation GroupDe inbrekers, die zichzelf Shadow Brokers noemen, stalen ‘cyberwapens’. Dat zijn verborgen manieren om netwerkbescherming en veiligheidssoftware te omzeilen. Het zijn geavanceerde middelen die toegeschreven worden aan de Equation Group. Dat is een mysterieuze hackersgroep die in verband gebracht wordt met de NSA. De Equation Group (letterlijk: vereffening) wordt onder meer verantwoordelijk gehouden voor Stuxnet, de kwaadaardige software waarmee een Iraanse nucleaire opwekkingscentrale werd platgelegd. Andere landen die vaak door de Equation Group belaagd worden zijn onder meer China, Rusland en landen in het Midden-Oosten. Bij hackers schieten superlatieven tekort om de almacht van deze Equation Group te beschrijven. Volgens een rapport van het Russische anti-virusbedrijf Kaspersky, zou de groep al decennialang actief zijn en grossieren in geavanceerde computerinbraken. Een van de bewijzen van hun vaardigheden is dat ze de bedieningssoftware van harde schijven op afstand kunnen herpogrammeren, een kunstje dat alleen de allerslimste hackers klaarspelen. Maar blijkbaar is de Equation group, en dus de NSA, niet onkwetsbaar. Edward Snowden lijkt zelf niet verdacht te worden van diefstal van de code. Hij was een ingehuurde medewerker van de NSA en ging er in 2013 vandoor met een serie usb-sticks waarop presentaties stonden, geen kwaadaardige software. Uit de Snowden-documenten bleek hoe de Amerikaanse geheime dienst inbreekt op computers en bedrijfsnetwerken om communicatie af te luisteren en documenten te stelen. Risico voor gewone burgerWie er ook achter de aanval en de publicatie zit, belangrijker is dat de hack aantoont dat het gebruik van obscure, geavanceerde wapens niet is voorbehouden aan geheime diensten. Uiteindelijk belanden ze in de openbaarheid, en daarmee ook binnen het bereik van cybercriminelen. Dat levert risico op voor gewone burgers – niet alleen voor statelijke actoren. Vaak stellen opsporingsdiensten dat software om in te breken in andermans computer veilig is in hun handen. In de praktijk blijkt dat de cyberwapens uiteindelijk altijd in de verkeerde handen vallen. https://www.nrc.nl/nieuws/2016/08/17/cyberwapens-van-de-nsa-liggen-op-straat-3814446-a1516687
6th Int. Workshop on SocioTechnical Aspects of Security and Trust (STAST2016) Colocated with 32nd Annual Computer Security Application Conference Los Angeles, USA  IMPORTANT DATES Submission: 23 September 2016Notification: 21 October 2016Camera Ready: [after the workshop]Workshop: December 5, 2016         SUBMISSION We accept(1) full papers;(2) position papers;(3) case studies  For more details, please visit our web page: http://www.stast2016.uni.lu  CONCEPT Successful attacks on information systems often combine social engineering practices with technical skills, exploiting technical vulnerabilities, insecure user behavior, poorly designed user interfaces, and unclear or unrealistic security policies. To improve security, technology must adapt to the users, because research in social sciences and usable security has demonstrated that insecure behavior can be justified from cognitive, emotional, and social perspectives.  However, also adherence to reasonable security policies and corresponding behavioral changes should augment and support technical security. Finding the right balance between the technical and the social security measures remains largely unexplored, which motivates the need for this workshop.  Currently, different security communities (theoretical security, systems security, usable security, and security management) rarely work together.  There is no established holistic research in security, and the respective communities tend to offload on each other parts of problems that they consider to be out of scope, an attitude that results in deficient or unsuitable security solutions. GOAL The workshop intends to stimulate an exchange of ideas and experiences on how to design systems that are secure in the real world where they interact with nonexpert users. It aims at bringing together experts in various areas of computer security and in social and behavioral sciences. INVITED SPEAKER Matt Bishop (Univ. California Davis) WORKSHOP TOPICS Relevant topics include but are not limited to: Requirements for sociotechnical systems Feasibility of  policies from the sociotechnical perspective Threat models that combine technical and humancentred strategies Technical and social factors that influence decision making in security and privacy Balance between technical measures and social strategies in ensuring security and privacy Studies of realworld security incidents from the sociotechnical perspective Social and technical factors that influence changes in security policies and processes Lessons learned from holistic design and deployment of security mechanisms and policies Models of user behaviour and user interactions with technology Perceptions of security, risk and trust and their influence on human behaviour Social engineering, persuasion, and other deception techniques Root cause analysis and analysis of incidents for sociotechnical security incidents Strategies, methodology and guidelines for sociotechnical and cybersecurity intelligence analysis Nudging to improve security User experience with security technologies  PROGRAM COMMITTEE Blocki, Jeremiah (Purdue University), Coventry, Lynne (Northumbria University) Jakobsson, Markus (Agari) Jenkinson, Graeme (Univ. of Cambridge) Kowalski, Stewart (Stockholm Univ.) Mannan, Mohammad (Concordia Univ.) Montoya, Lorena (Univ. of Twente) Oliveira, Daniela (Univ. of Florida) Parkin, Simon (Univ. College London) Petrocchi, Marinella (Inst. of Inf. and TelematicsCNR), Probst, Christian W. (DTU), Radomirovic, Sasa (ETH Zurich) Renaud, Karen (Univ. of Glasgow) Ryan, Peter (Univ. Luxembourg) Stobert, Elizabeth (Carleton University), Weippl, Edgar (SBA Research) Yan, Jeff (Lancaster Univ.) Yu, Ilsun (Soonchunhyang Univ.) Zurko, Mary Ellen (Cisco Systems) ORGANIZING COMMITTEE Programme ChairsBenenson, Zinaida (Univ. of ErlangenNuremberg ) Gates, Carrie (Independent Contractor)  Workshop OrganizersBella, Giampaolo (Univ. of Catania)Lenzini, Gabriele (Univ. of Luxembourg)  
Cryptografen Léo Ducas van het Centrum Wiskunde & Informatica (CWI) en Peter Schwabe (Radboud Universiteit) hebben de internationale Internet Defense Prize 2016 gewonnen. Zij kregen de prijs samen met hun co-auteurs Erdem Alkim (Ege University, Turkije) en Thomas Pöppelmann (Infineon Technologies AG, Duitsland) voor hun paper 'Post-Quantum Key Exchange - A New Hope'. De prijs werd uitgereikt op 10 augustus tijdens het 25e USENIX Security Symposium in Austin, Texas. Facebook stelde de Internet Defense Prize in 2014 in, met USENIX als partner. De prijs bestaat uit 100.000 dollar.  "De informatiebeveiligingsindustrie houdt een race tegen de klok om sneller te innoveren dan de tegenstanders die consumenten en bedrijven schade willen toebrengen", schrijft Facebook. "De meeste security research richt zich echter vooral op aanvallende noviteiten op hackersgebied die weinig invloed hebben op het leven van de meeste mensen". Om ook de andere kant te stimuleren is de Internet Security Prize ingesteld om onderzoekers te belonen die een werkend prototype te combineren met aanzienlijke bijdrages aan de veiligheid van het Internet – met name op het gebied van bescherming en verdediging, aldus Facebook. Post-quantum securityHet winnende team stelde een verbeterd cryptosysteem voor, 'NewHope', dat is ontworpen om aanvallen van toekomstige kwantumcomputers te weerstaan. Zulke kwantumcomputers zouden een verwoestend effect hebben op de veiligheid van onze huidige protocollen - een komst die soms wordt aangeduid als een 'Cryptocalypse'. NewHope kan bijvoorbeeld worden geïntegreerd in TLS en HTTPS, twee security protocollen die worden gebruikt door webbrowsers. Dit werd onlangs gedaan door Google, als een experiment voor post-quantum beveiliging. Hierover verscheen een artikel in Wired. Jury-oordeelFacebook laat weten: "Voortbouwend op eerdere studies identificeerde dit nieuwe onderzoek een gepastere foutverdeling en een beter passend reconciliation mechanisme, analyseerde het de robuustheid van het cryptosysteem tegen aanvallen van kwantumcomputers en identificeert het een verdedigingsmogelijkheid tegen mogelijke  achterdeurtjes en alles-voor-de-prijs-van-één-aanvallen. Met deze maatregelen was het team in staat om de security parameter met meer dan 100 procent te verhogen, de communicatie-overhead met meer dan de helft te verminderen en de rekensnelheid in portable C implementatie en de huidige Intel CPU’s aanzienlijk te verhogen – en dit alles met bescherming tegen timing aanvallen".  Léo Ducas werkt in de Cryptology onderzoeksgroep bij het Centrum Wiskunde & Informatica (CWI) in Amsterdam, onder leiding van Ronald Cramer. Ducas kreeg onlangs een Veni-subsidie toegekend. Peter Schwabe werkt aan de Radboud Universiteit in Nijmegen. Het onderzoek is mede gefinancierd door een NWO Vrije Competitie subsidie en door een publiek-privaat partnerschap tussen CWI en NXP Semiconductors. Over het Centrum Wiskunde & InformaticaHet Centrum Wiskunde & Informatica (CWI) is sinds 1946 het nationale onderzoeksinstituut voor wiskunde en informatica. Het is gevestigd op het Amsterdam Science Park en is deel van de Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO). Het instituut heeft een sterke internationale positie. Ruim 150 wetenschappers doen er grensverleggend onderzoek en dragen de verkregen kennis over aan de maatschappij. Meer dan 30 van de onderzoekers zijn hoogleraar aan een universiteit. Het instituut heeft 22 spin-off bedrijven voortgebracht. Over de Radboud UniversiteitDe Radboud Universiteit is een brede, internationaal georiënteerde en studentgerichte onderzoeksuniversiteit. Het Institute for Computing and Information Sciences (iCIS) is een van de grote onderzoeksinstituten aan de Radboud Universiteit, en heeft als doel om de fundamenten van softwareontwikkeling te verbeteren via formele, wiskundige theorieen, en methoden en gereedschappen die de specificatie, het ontwerp en de analyse en evaluatie van computersystemen ondersteunen. Persbericht Centrum Wiskunde & Informatica (CWI) en Radboud Universiteit Amsterdam, 12 augustus 2016  
Third International Workshop on Computational Intelligence Techniques for Industrial and Medical Applications Collocated with:SITIS 2016 - The 12h International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS27 November, 1 December 2016 - Naples, Italy  * Scope of the WorkshopComputational Intelligence techniques are adopted in many industrial applications, like visual based quality control, image enhancement in consumer electronics, image quality enhancement, video based recognition of identity or behaviors, audio based speech recognition for enhanced human like interaction with machines etc. It also has a strong impact in medical applications, like medical image enhancement, semi-automatic detection of pathologies, pre-filtering and reconstruction of volumes from medical scans etc. Despite this growing diffusion, there are still many possible areas where computational intelligence application is partial or could be extended and improved, due to the actual limitations in terms of computational power or strict requirements in terms of assurance of the results. This workshop aims to investigate the impact of the adoption of advanced and innovative Computational Intelligence techniques in industrial and medical applications. This edition of the workshop is focused primarily on image processing and industrial and medical applications with special emphasis to real time systems and image acquisition pipelines. The workshop will bring together researchers on different disciplines from academia and industry with a common objective: go beyond the frontiers of today industrial applications of Computational Intelligence techniques.  http://sitis-conf.org/en/citima-2016.php Topics for the workshop include, but are not limited to:- Imaging for Industrial applications- Computational Intelligence approaches in Biomedical Signal Processing- Computational Intelligence approaches in Consumer Electronics- Real-time Multimedia Signal Processing- Intelligent User Interfaces- Virtual-augmented reality for Healthcare- Real-time digital images & watermarking- Real-time signal compression and analysis- Demosaicking and denoising in digital image acquisition pipeline- Spatial and temporal estimation and protection of media streams- Learning systems for signal and information processing and evidential reasoning for recognition- Soft computing approaches for embedded multimedia systems- Real time signal processing & vision- Expert system for embedded system- Color and illumination processing * Important dates- Submission deadline: September 11, 2016- Acceptance/Reject notification: October 9, 2016- Camera-ready:  October 16, 2016- Author Registration:  October 23, 2016 * SubmissionEach submission should be at most 8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format available at:- Microsoft Word DOC- LaTex Formatting MacrosPaper submission will only be online via: Easy Chair.Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of expression by at least two reviewers. The organizers will examine the reviews and make final paper selections. * PublicationAll the papers accepted for the workshop will be included in the conference proceedings. The proceedings will be published by IEEE Computer Society.Content will be submitted to the indexing companies for possible indexing.They will be available at the conference.  * RegistrationAt least one author of each accepted paper must register for the workshop.Workshop registration fee is determined by SITIS. A single registration for the workshop or the conference allows attending both events. * Program Co-Chairs- M. Anisetti Università degli studi di Milano, Italy- R. Sassi Università degli studi di Milano, Italy- V. Bellandi, Università degli Studi di Milano, Italy- G. Jeon, Incheon National University, Korea * Contacts- marco.anisetti@unimi.it- roberto.sassi@unimi.it  
Bekijk het volledige nieuwsoverzicht >