Документ взят из кэша поисковой машины. Адрес оригинального документа : http://www.suny.msu.ru/en/CyberCon05En.doc
Дата изменения: Mon Oct 3 11:44:31 2005
Дата индексирования: Mon Oct 1 19:46:56 2012
Кодировка:

Announcement

On November 2-3, 2005

Lomonosov Moscow State University
will conduct
jointly with the Academy of Cryptography of the Russian Federation
the Fourth All-Russian Conference
"Mathematics and Security of Information Technologies" [Cybersecurity?]
and
jointly with the Center of International Studies, Cambridge University,
United Kingdom,
Advanced Research Workshop
"Unconventional Information Warfare and the War on Terror: Critical Issues
and
International Cooperation"


Preliminary Program


Wednesday, November 2, 2005

Plenary Session

Conference Hall of the Intellectual Center of
Lomonosov Moscow State University [?]

09:15-10:00. Registration

10:00-10:10. Opening of the Conference by Rector V.A. Sadovnichii

10:10-13:00. Plenary Reports (up to 40 min)

1. Sherstyuk V.P., Streltsov A.A. (Security Council of the Russian
Federation)
"Relevant Problems of providing global information infrastructure
security"
2. Krutskih A.V. (Ministry of Foreign Affairs of the Russian Federation)
"International cooperation and information security"
3. Paul Williams (Houston, USA)
"Pitfalls of Best Practices in IT Auditing"
"Physical and Cyber Intrusions of Facilities & Networks"
4. Vasenin V.A. (Head of the Department of the IISI of the MSU)
"Scientific problems of counter cyber terrorism"[cyber
counterterrorism?]

13:00-14:30. Lunch

14:30-17:00. Panel/Roundtable?
"Mathematical and software support of computer systems security"
(Moderator - Vasenin V.A., Head of the Department of the IISI of the MSU)

Thursday, November 3, 2005

10:00-13:00. Plenary Reports (up to 40 min)

1. Miroshnikov B.N. (Ministry of Internal Affairs of the Russian
Federation)
"Problems of counter cyber crimes"
2. Representative of George C.Marshall Center
3. Ross Anderson (Cambridge)
4. Cheremushkin A.V. (ICSI)

13:00-14:30. Lunch
14:30-17:00. Panel/Roundtable[?]
"Mathematical Problems of information security"
(Moderator -Logachev O.A. (MSU), Chair, Department of the IISI.

14.30-17.00. Round Table Discussion "Counter Cyber terrorism [cyber
counterterrorism[??]: political, social, legal, and scientific and
technical aspects"
Hosts: Streltsov A.A. (Security Council of the Russian Federation),
Vasenin V.A. (IISI MSU), Rafal Rohozinski (University of Cambridge,
United Kingdom).

Conference Co-Chairmen
1. Sadovnichii V.A. - Rector of the Moscow State University;
2. Sherstyuk V.P. - Security Council of the Russian Federation;
3. Andreeev N.N. - President of the Academy of Cryptography in the
Russian Federation.
Advanced Research Workshop
1. Rafal Rohozinski - Co-Director, University of Cambridge, United
Kingdom;
2. Sokolov V.V. (MSU) - Co-Director, Deputy Director of the ISII.

Organization Committee
1. Yashchenko V.V. (MSU) - Chairman of the Organization Committee,
Deputy Director of the ISII.

Conference Secretariat
1. Sharyapov R.A. - Executive Secretary of the Organization
Committee;
2. Solodovnikov V.I.;
3. Anohin M.I.;
4. Baranova G.V.;
5. Bratash T.A.

Reports/papers submitted for the Conference will be accepted or
rejected by the Program Committee on a competitive basis. The Committee
may recommend acceptance for the plenary session (up to 40 min), for
subject-matter [panel/roundtable?] sessions (up to 30 min), or as a bench-
top report [workshop?].

Papers rejected because of topic discrepancy, deadlines, or requirement
failures will not be returned.

Deadline - reports (theses/papers) must be sent on or prior to October 1,
2005
Size of the thesis - up to 5 pages
Theses received later than October 1, 2005 will not be considered.
Publication of theses and reports will be realized according to Bureau
Sections of the Conference.
[Conference Bureau Sections will evaluate papers for publication in Russian
and English]
As a result of the Conference, theses are planned to be published (in
Russian and English languages).

Conference applications will be accepted until October 1, 2005 and should
be sent to the following e-mail address: mabit2005@iisi.msu.ru

The Organization Committee does not provide financial support to Conference
participants.
Contact information:
Telephone #: +7 (095) 932-89-58, 939-52-79,
Fax: +7(095) 939-20-96
E-Mail: mabit2005@iisi.msu.ru.
Web-sites: www.msu.ru, www.iisi.msu.ru,
www.cryptography.ru


ENCLOSURE.

Report requirements.

Theses (file in LaTeX format) should be sent no later than October 1, 2005
to the following address: 119992, GSP-2, Leninsky Hills, Moscow State
University, Institute Information Security Issues, Organization Committee
of the Conference or by e-mail: mabit2005@iisi.msu.ru.

Files should be in LaTeX format (document class article) in coding KO18-R,
CP1251, or CP866. Standard tools of LaTeX (\section,
\begin{thebibliography}.\end{thebibliography}, \begin
{equation}.\end{equation}, etc.) should be used for making sections and
various object numeration. References should be made not with object number
indication but with the following commands \label, \bibitem, \ref and
\cite. Graphic illustrations which could not be made with LaTeX tools
(\begin{picture}.\end{picture}), should be stated as files. The most
preferable format is Encapsulated PostScript (EPS) because it is a vector
character and it is not converted from bitmap format. In this case
illustrations could be adjusted to scale without loosing quality. If an
image has a bitmap nature (for example a picture) than it can be sent as
file in JPEG, PNG, or GIF format.


A Thesis Model
--------------------------

\documentclass{article}

.
\title{}

\author{<1st author>\thanks{reference to grant(-s)>}

\and<2nd author>\thanks{reference to grant(-s)>}.}

\begin{document}

\maketitle

\section{
}

.

\begin{equation}
\label{eq:xxx}
.

\end{equation}

.

% Reference example.
The way it is showed in ~\cite{yyy:2000}, has a place ~(\ref{eq:xxx}).

.

% List of books

\begin {thebibliography} {00}
\bibitem{yyy:2000}.

.

\end{thebibliography}
\end{document}

______________________________________

Information about the author should be added to theses of each report
(last, first, and middle name, place of work, position, academic degree and
title, address with ZIP code, telephone, and e-mail address).