NOTE: Please bring your notebook to the tutorial for use during practical exercises as may be applicable. High speed wireless Internet access will be available for registrants' use at conference meeting rooms, tutorial rooms, and hallway during May 7-10.

1. Using Free Linux Live CD for Penetration Testing and Vulnerability Analysis
By Christopher D. Chavez, Digitel Telecom, Phillipines.
Half day: afternoon of May 8; Tutorial Detail.

2. Privacy in Digital Age
By Justin ZHAN, Carnegie Mellon Univ., USA.
Half day: morning of May 8; Tutorial Detail.

3. Open-Source Intelligence and Analysis
By Ahmet KOLTUKSUZ & Selma TEKİR, Information Systems Strategy and Security Lab., Izmir Institute of Technology, Turkey.
Half day: afternoon of May 7; Tutorial Detail.

4. How to Establish & Run a Cryptographic Key Management Center
By Ahmet KOLTUKSUZ, Information Systems Strategy and Security Lab., Izmir Institute of Technology, Turkey.
Full day: on May 8; Tutorial Detail.

5. Elliptic Curve Cryptography
By Ersan AKYILDIZ, Middle East Technical University, Turkey.
Full day on May 7; Tutorial Detail.

6. AKiS, Smart Card Operating System
By Mustafa BAŞAK, TÜBİTAK-UEKAE, Turkey.
Full day: on May 8; Tutorial Detail.

7. Making of a Multiprecision Cryptographic Software Library: Experiences with CRYMPIX
By Hüseyin HIŞIL, Information Security Institute, Queensland University of Technology, Australia, and,
Serap ATAY, Information Systems Strategy and Security Lab., Izmir Institute of Technology, Turkey.
Half day: morning of May 7; Tutorial Detail.

8. Creating/Using a Management System to Manage Information Security and ISO 27001 Certification
By Murat LOSTAR, Lostar Information Security, Turkey.
Full day on May 7; Tutorial Detail.


Tutorials will take place on 7th & 8th May. Timing will be announced soon.

T.7- Crympix T.3- Intelligence T.2- Privacy T.1- Penetration
T.5- Elliptic Curve Crypto T.4- Crypto Key Mngt Center
T.8- Info Security Mngt System T.6- Smart Card OS



Tutorial proposal due date has passed. The available tutorials have been announced as above; the following is for the records.

To propose a tutorial please contact the Tutorial Chair.

SIN 2007- International Conference on Security of Information and Networks,
May 8-10, 2007, Gazimagusa (TRNC), North Cyprus.

Prospective tutorial instructors are invited to submit proposals for SIN 2007 Conference. Tutorials at SIN 2007 Conference will run in parallel with other conference sessions for either a half day or a full day. Proposals on contemporary topics and recent developments in the field of information security in the conference themes are especially welcome; other fields of interest are listed in the conference CFP.

The deadline for proposal submission is February 21, 2007. Please follow the format below for submitting tutorial proposals. Tutorial proposals will be reviewed by the Program Committee of SIN 2007 Conference; proponents will be notified whether their proposals are accepted by March 09, 2007. Instructors of accepted tutorials will receive free registration to SIN 2007 Conference and, if tutorial is actually run, an honorarium to be included in the contract to be signed by the accepted tutorial speakers.

Tutorial proposals should be submitted by e-mail to sabaneren (at) maltepe.edu.tr.



Tutorial proposals should include the following information:

1. Tutorial title. The title will appear in the conference program if the proposal is accepted.

2. Proponent(s) information. This is the instructor(s)’s name, telephone number and address.

3. Email contact. This is the email address for correspondence with the tutorial proponent(s).

4. Instructor(s) bio-sketch. The bio-sketch should be 250 words to 500 words in length.

5. Tutorial abstract. This abstract will be used to advertise the proposal, for instance, on the conference’s web site prior to the conference. The abstract should be 250-word long at most.

6. Tutorial outline. The topics covered in the tutorial will be listed and briefly discussed in the outline, along with the amount time planned for each topic. Half-day tutorials will run for a total of about 3 hours; full day tutorials will run for about 6 hours.

7. Tutorial goals. This is a one-page discussion of the tutorial’s goals and benefits to prospective participants.


Released on: Nov. 18, 2006.