2010-02-26

[Tccc] [WISTP 2010] Call for Participation

*******************************
CALL FOR PARTICIPATION
*******************************

FOURTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2010):
Security and Privacy of Pervasive Systems and Smart Devices
April 12-14, Passau, Germany - http://www.wistp.org/

The impact of pervasive and smart devices on our daily lives is ever
increasing, and the rapid technological development of information
technologies ensures that this impact is constantly changing. It is
imperative that these complex and resource constrained technologies
are not vulnerable to attack. This workshop will consider the full
impact of the use of pervasive and smart technologies on individuals,
and society at large, with regard to the security and privacy of the
systems that make use of them.

REGISTRATIONS OPEN AT : http://www.wistp.org/

FINAL PROGRAM

---------------------------------
Monday, April 12 2010
---------------------------------

12:30-14:00 REGISTRATION

14:00-15:00 WELCOME/INVITED TALK

Security in the Internet of Things
Manfred Aigner

15:00-16:00 EMBEDDED SECURITY: PART 1 (SESSION 1)

Efficient and Effective Buffer Overflow Protection on ARM
Processors
Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens

Efficient Entropy Estimation for Mutual Information Analysis
Using B-splines
Alexandre Venelli

16:00-16:30 COFFEE BREAK

16:30-18:00 EMBEDDED SECURITY: PART 2 (SESSION 2)

A Probabilistic Diffusion Scheme for Anomaly Detection on
Smartphones
Christian Bauckhage, Tansu Alpcan and Aubrey-Derrick Schmidt

A Smart Card Implementation of the McEliece PKC
Falko Strenzke

Evaluation Metrics of Physical Non-invasive Security for
Cryptographic Modules
Huiyun Li, Fengqi Yu, Hai Yuan

19:00 WELCOME RECEPTION


---------------------------------
Tuesday, April 13 2010
---------------------------------

8:30- 9:00 REGISTRATION

9:00-10:30 PROTOCOLS (SESSION 3)

Trust in Peer-to-Peer Content Distribution Protocols
Nicolai Kuntze, Carsten Rudolph and Andreas Fuchs

Generic Constructions of Biometric Identity Based Encryption
Systems
Neyire Deniz Sarier

Design and Analysis of a Generalized Canvas Protocol
Marian Novotny

10:30-11:00 COFFEE BREAK

11:00-12:30 HIGHLY CONSTRAINED EMBEDDED SYSTEMS (SESSION 4)

Efficient Mutual Authentication for Multi-domain RFID Systems
Using Distributed Signatures
Michael Braun, Ulrike Meyer, Susanne Wetzel

Practical Schemes for Privacy & Security Enanced RFID
Jaap-Henk Hoepman and Rieks Joosten

MoteAODV - An AODV Implementation for TinyOS 2.0
Werner Backes and Jared Cordasco (to be presented by
Susanne Wetzel)

12:30-14:00 LUNCH

14:00-15:30 SECURITY (SESSION 5)

Random Number Generation Based on Fingerprints
Shkodran Gerguri, Vaclav Matyas, Zdenek Rihaand Ludek Smolek

Improvements of Pan-European IDM Architecture to Enable Identity
Delegation Based on X.509 Proxy Certificates and SAML
Sergio Sanchez and Ana Gomez

Fraud Detection for Voice over IP Services on Next-Generation
Networks
Igor Ruiz-Agundez, Yoseba K. Penya and Pablo Garcia Bringas

15:30-16:00 COFFEE BREAK

16:00-17:00 SMART CARD SECURITY: SHORT PAPERS (SESSION 6)

Proxy Smart Card Systems
Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo and
Ivan Visconti

Supporting Applications' Evolution in Multi-Application Smart
Cards by Security-by-Contract
Nicola Dragoni, Olga Gadyatskaya and Fabio Massacci

Website Credential Storage and Two Factor Web Authentication with
a Java SIM
Jon Hart, Konstantinos Markantonakis and Keith Mayes

17:00-17:30 COFFEE BREAK

17:30-18:30 ALGORITHMS: SHORT PAPERS (SESSION 7)

Attribute-based Encryption with Break-glass
Achim D. Brucker, Helmut Petritsch and Stefan G. Weber

On the Security of a Two-Factor Authentication Scheme
Luigi Catuogno and Clemente Galdi

The Design of Secure and Efficient P2PSIP Communication Systems
Xianghan Zheng and Vladimir Ole

20:00 GALA DINNER


---------------------------------
Wednesday, April 14 2010
---------------------------------

8:30- 9:00 REGISTRATION

9:00-11:00 HARDWARE IMPLEMENTATIONS (SESSION 8)

Novel FPGA-based Signature Matching for Deep Packet Inspection
Nitesh Guinde and Sotirios Ziavras

Towards Electrical, Integrated Implementations of SIMPL Systems
Ulrich Rughrmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli,
Ulf Schlichtmann and Gyorgy Csaba

A Very Compact Hardware Implementation of the KASUMI Block Cipher
Dai Yamamoto, Kouichi Itoh and Jun Yajima

11:00-11:30 COFFEE BREAK

11:30-12:50 EMBEDDED SYSTEMS: SHORT PAPERS (SESSION 9)

Secure and Usable Out Of Band Channels for Ad hoc Mobile Device
Interactions
Ronald Kainda, Bill Roscoe and Ivan Flechais

Identification and Verification of Security Relevant Functions in
Embedded Systems Based on Source Code Annotations and Assertions
Johannes Loinig, Christian Steger, Reinhold Weiss and
Ernst Haselsteiner

Security Analysis of Mobile Phones Used as OTP Generators
Havard Raddum, Lars Hopland Nestasand Kjell Jørgen Hole

An Energy-Efficient Symmetric Cryptography Based Authentication
Scheme for Wireless Sensor Networks
Oscar Delgado-Mohatar, Jose M. Sierra, Ljiljana Brankovic, and
Amparo Fuster-Sabater

12:50-14:00 LUNCH

14:00-15:00 INVITED TALK (JOINT WITH CARDIS)

The Emotion of Identity
Bertrand du Castel

15:00-15:30 COFEE BREAK

15:30-17:00 ANONYMITY/DATABASE SECURITY (SESSION 10)

The Market Failure of Anonymity Services
Heiko Roßnagel

Exploiting Node Mobility for Coordinating Data Usage in Crisis
Scenarios
Giovanni Russello and Enrico Scalavino

Predicting and Preventing Insider Threat in Relational Database
Systems
Qussai Yaseen and Brajendra Panda

17:00-17:30 WRAP-UP, FAREWELL AND ANOUNCEMENT OF WISTP 2011

_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: