Co-sponsored by DIMACS and Microsoft Corporation.
Presented under the auspices of the DIMACS Special Focus on Next Generation Networks Technologies and its Applications and the DIMACS Special Year on Networks.
Monday April 17, 2000 -------------------- 8:00 - 8:50 Breakfast and Registration 8:50 - 9:00 Welcome and Greeting: Fred S. Roberts, DIMACS Director 9:00 - 10:00 Television and tamper resistance Paul Kocher, Cryptography Research, Inc. 10:00 - 10:25 DIVX, DPRM, and SDMI Drew Dean, Xerox PARC 10:25 - 10:50 Watermarking, Tamper-Proofing, and Obfuscation:
Tools for Software Protection Christian Collberg, University of Arizona and Clark Thomborson,
University of Auckland 10:50 - 11:15 Break 11:15 - 12:00 Stronger copyright protection for cyberspace:
desirable, inevitable, and irrelevant Andrew Odlyzko, AT&T Labs 12:00 - 12:30 Passive Fingerprinting Yacov Yacobi, Microsoft Research 12:30 - 1:30 Lunch 1:30 - 2:30 Content protection through copy detection Narayanan (Shiva) Shivakumar, Gigabeat 2:30 - 2:55 A Graph Theoretic Approach to Software Watermarking Ramarathnam Venkatesan, Microsoft Research; Vijay Vazirani, Georgia Tech,
Saurabh Sinha, University of Washington 2:55 - 3:20 Efficient Distribution of Fingerprinted Content Josh Benaloh, Microsoft Research 3:20 - 3:45 Break 3:45 - 4:45 Digital Rights Management: Research Questions and Practical Implementations Stuart Haber, Intertrust 4:45 - 5:10 Long-Lived Broadcast Encryption Juan Garay, Jessica Staddon and Avishai Wool, Bell Labs 5:10 - 5:35 Intellectual Property Protection for Software David Krivoshik, Gibbons, Del Deo, Dolan, Griffinger & Vecchione Tuesday, April 18, 2000 ---------------------- 9:00 - 10:00 Summary of the National Research Council's "Digital Dilemma" report: Findings, non-findings, and implications for the technical agenda Clifford Lynch, Coalition for Networked Information, Joan Feigenbaum, AT&T Labs 10:00 - 10:25 Distribution Chain Security Glenn Durfee, Stanford University, Matt Franklin, Xerox PARC 10:25 - 10:50 Defense against man-in-the middle in client server systems with secure servers Richard Lipton, Princeton University, Dimitrios Serpanos, University of Crete 10:50 - 11:15 Break 11:15 - 12:15 The Effect of Anti-Circumvention Provisions on Security Jonathan Callas, Counterpane Internet Security, Bruce Schneier,
Counterpane Internet Security 12:15 - 12:45 Status Report on the NSF Information Technology Research Program Presentation (plus question and answer session) Rick Adrion and Michael Evangelist, NAtional Science Foundation 12:45 - 1:45 Lunch 1:45 - 2:30 Intellectual Property in the Information Age: Will Laws and Technology Destroy Public Libraries? Barbara Simons, ACM 2:30 - 2:55 Image Hashing Mariusz Jakubowski, Microsoft Research, Ramarthnam Venkatesan,
Microsoft Research 2:55 - 3:30 Break 3:30 - 3:55 Copy-Protection Policies for Digital Images Greg Heileman, Elisar Software Corporation and University of New Mexico,
Carlos Pizano, University of New Mexico 3:55 - 4:20 A proven secure tracing algorithm for the optimal KD traitor tracing scheme Kaoru Kurosawa, Tokyo Institute of Technology, Mike Burmester,
Royal Holloway, Yvo Desmedt, University of Florida