International Summer School on Information Security

Bilbao, Spain, July 6-10, 2015

InfoSec 2015 Registration Form

(form version 1.11 courses)


  1. Either by bank transfer to:

    Uno-e Bank
    bank's address: Julian Camarillo 4 C, 28037 Madrid, Spain
    IBAN: ES3902270001820201823142
    account holder: C. Martin – GRLMC
    account holder’s address: Av. Catalunya 35, 43002 Tarragona, Spain

  2. Remarks: (1) Bank transfers should not involve any expense for the School. (2) Participants claiming early registration will be requested to prove that the bank transfer order was carried out by the deadline in case the fees arrive later.

  3. Or by PayPal.

  4. Remark: An extra fee of Euro 25 will be added automatically, to cover the transfer expenses PayPal will charge to the organizers.

General remarks concerning payment:
  • Mention InfoSec 2015 and your name in the subject.
  • A receipt will be provided on site.
  • Participants registering on site must pay in cash. For the sake of local organization, however, it is much recommended to do it earlier.


Fees comprise access to all courses and lunches.

Registration deadlines and fees

Paid until Full [Euro]
January 3, 2015290
February 3, 2015330
March 3, 2015370
April 3, 2015410
May 3, 2015450
June 3, 2015490
July 3, 2015530
July 10, 2015570

Registration conditions

Please provide the following contact information: (bold fields are mandatory)!

1 The default values for City and Country fields are based on the client IP remote address. This information might be not very accurate (due to ISP policies, proxy connections, etc.), and we kindly ask you to provide the right values for the registration form.


Name in Latex:
(with accents, please)

(Prof., Dr., Mr., Mrs.)


(Professor, Researcher, PhD student, etc.)




Please provide the following academic background:

Degree (PhD, Masters, Bachelor, etc.):


Speciality (if any):

Registration Type:

570 Euro: Full

free: (Deusto University students)

Please indicate maximum 8 courses you would tentatively like to attend.

N. Asokan (Aalto University), [intermediate] Mobile Security: Overview of Hardware Platform Security and Considerations of Usability

Jan Camenisch (IBM Research, Zurich), [introductory/intermediate] Technologies to Protect Online Privacy

Nicolas T. Courtois (University College London), [introductory/intermediate] Security of ECDSA in Bitcoin and Crypto Currency

Claude Crépeau (McGill University, Montréal), [introductory/intermediate] Quantum Computation, Cryptography and Cryptanalysis

Joan Daemen (ST Microelectronics Belgium, Diegem), [introductory/intermediate] Sponge Functions, Keccak and SHA-3

Hervé Debar (Télécom SudParis), [introductory/intermediate] Detection and Reaction to Attacks: from Intrusion Detection to Cyber-Defense

Rosario Gennaro (City University of New York), [intermediate/advanced] A Survey of Verifiable Delegation of Computation

Trent Jaeger (Pennsylvania State University, University Park), [intermediate/advanced] How to Add Security Enforcement to Legacy Programs

Antoine Joux (Pierre et Marie Curie University, Paris), [introductory/intermediate] Discrete Logarithms in Finite Fields

Songwu Lu (University of California, Los Angeles), [introductory/intermediate] Cellular Network Security: Issues and Defenses

Catherine Meadows (Naval Research Laboratory, Washington DC), [introductory/intermediate] Formal Analysis of Cryptographic Protocols

Nasir Memon (New York University), [introductory/intermediate] User Authentication

Ethan L. Miller (University of California, Santa Cruz), [introductory/intermediate] Securing Stored Data in a Connected World

Stefano Paraboschi (University of Bergamo), [introductory/intermediate] Data Protection in Network-enabled Systems

Bart Preneel (KU Leuven), [introductory/intermediate] Cryptology: State of the Art and Research Challenges

Shantanu Rane (Palo Alto Research Center), [introductory/intermediate] Privacy-preserving Data Analytics: Problems, Solutions and Challenges

Mark Ryan (University of Birmingham), [introductory/intermediate] Designing Security Protocols: Electronic Voting, and Electronic Mail

Stefan Saroiu (Microsoft Research, Redmond), [advanced] Protecting Data on Smartphones and Tablets Using Trusted Computing

Gene Tsudik (University of California, Irvine), [intermediate/advanced] Security and Privacy in Candidate Future Internet Architectures

Yang Xiao (University of Alabama, Tuscaloosa), [introductory/advanced] Security in Smart Grids

Supplementary information:

Arriving Date:

Departure Date:

Notes for organizers:

Acknowledgement and Copyright Notice

To get City and Country information we use the GeoLite City databases, and the free server library provided by MaxMind (Copyright (c) 2008 MaxMind, Inc.) for which there is an OPEN DATA LICENSE.

This product includes GeoLite data created by MaxMind, available from