CALL FOR PARTICIPATION
*******************************
FOURTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2010):
Security and Privacy of Pervasive Systems and Smart Devices
April 12-14, Passau, Germany - http://www.wistp.org/
The impact of pervasive and smart devices on our daily lives is ever
increasing, and the rapid technological development of information
technologies ensures that this impact is constantly changing. It is
imperative that these complex and resource constrained technologies
are not vulnerable to attack. This workshop will consider the full
impact of the use of pervasive and smart technologies on individuals,
and society at large, with regard to the security and privacy of the
systems that make use of them.
REGISTRATIONS OPEN AT : http://www.wistp.org/
FINAL PROGRAM
---------------------------------
Monday, April 12 2010
---------------------------------
12:30-14:00 REGISTRATION
14:00-15:00 WELCOME/INVITED TALK
Security in the Internet of Things
Manfred Aigner
15:00-16:00 EMBEDDED SECURITY: PART 1 (SESSION 1)
Efficient and Effective Buffer Overflow Protection on ARM
Processors
Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens
Efficient Entropy Estimation for Mutual Information Analysis
Using B-splines
Alexandre Venelli
16:00-16:30 COFFEE BREAK
16:30-18:00 EMBEDDED SECURITY: PART 2 (SESSION 2)
A Probabilistic Diffusion Scheme for Anomaly Detection on
Smartphones
Christian Bauckhage, Tansu Alpcan and Aubrey-Derrick Schmidt
A Smart Card Implementation of the McEliece PKC
Falko Strenzke
Evaluation Metrics of Physical Non-invasive Security for
Cryptographic Modules
Huiyun Li, Fengqi Yu, Hai Yuan
19:00 WELCOME RECEPTION
---------------------------------
Tuesday, April 13 2010
---------------------------------
8:30- 9:00 REGISTRATION
9:00-10:30 PROTOCOLS (SESSION 3)
Trust in Peer-to-Peer Content Distribution Protocols
Nicolai Kuntze, Carsten Rudolph and Andreas Fuchs
Generic Constructions of Biometric Identity Based Encryption
Systems
Neyire Deniz Sarier
Design and Analysis of a Generalized Canvas Protocol
Marian Novotny
10:30-11:00 COFFEE BREAK
11:00-12:30 HIGHLY CONSTRAINED EMBEDDED SYSTEMS (SESSION 4)
Efficient Mutual Authentication for Multi-domain RFID Systems
Using Distributed Signatures
Michael Braun, Ulrike Meyer, Susanne Wetzel
Practical Schemes for Privacy & Security Enanced RFID
Jaap-Henk Hoepman and Rieks Joosten
MoteAODV - An AODV Implementation for TinyOS 2.0
Werner Backes and Jared Cordasco (to be presented by
Susanne Wetzel)
12:30-14:00 LUNCH
14:00-15:30 SECURITY (SESSION 5)
Random Number Generation Based on Fingerprints
Shkodran Gerguri, Vaclav Matyas, Zdenek Rihaand Ludek Smolek
Improvements of Pan-European IDM Architecture to Enable Identity
Delegation Based on X.509 Proxy Certificates and SAML
Sergio Sanchez and Ana Gomez
Fraud Detection for Voice over IP Services on Next-Generation
Networks
Igor Ruiz-Agundez, Yoseba K. Penya and Pablo Garcia Bringas
15:30-16:00 COFFEE BREAK
16:00-17:00 SMART CARD SECURITY: SHORT PAPERS (SESSION 6)
Proxy Smart Card Systems
Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo and
Ivan Visconti
Supporting Applications' Evolution in Multi-Application Smart
Cards by Security-by-Contract
Nicola Dragoni, Olga Gadyatskaya and Fabio Massacci
Website Credential Storage and Two Factor Web Authentication with
a Java SIM
Jon Hart, Konstantinos Markantonakis and Keith Mayes
17:00-17:30 COFFEE BREAK
17:30-18:30 ALGORITHMS: SHORT PAPERS (SESSION 7)
Attribute-based Encryption with Break-glass
Achim D. Brucker, Helmut Petritsch and Stefan G. Weber
On the Security of a Two-Factor Authentication Scheme
Luigi Catuogno and Clemente Galdi
The Design of Secure and Efficient P2PSIP Communication Systems
Xianghan Zheng and Vladimir Ole
20:00 GALA DINNER
---------------------------------
Wednesday, April 14 2010
---------------------------------
8:30- 9:00 REGISTRATION
9:00-11:00 HARDWARE IMPLEMENTATIONS (SESSION 8)
Novel FPGA-based Signature Matching for Deep Packet Inspection
Nitesh Guinde and Sotirios Ziavras
Towards Electrical, Integrated Implementations of SIMPL Systems
Ulrich Rughrmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli,
Ulf Schlichtmann and Gyorgy Csaba
A Very Compact Hardware Implementation of the KASUMI Block Cipher
Dai Yamamoto, Kouichi Itoh and Jun Yajima
11:00-11:30 COFFEE BREAK
11:30-12:50 EMBEDDED SYSTEMS: SHORT PAPERS (SESSION 9)
Secure and Usable Out Of Band Channels for Ad hoc Mobile Device
Interactions
Ronald Kainda, Bill Roscoe and Ivan Flechais
Identification and Verification of Security Relevant Functions in
Embedded Systems Based on Source Code Annotations and Assertions
Johannes Loinig, Christian Steger, Reinhold Weiss and
Ernst Haselsteiner
Security Analysis of Mobile Phones Used as OTP Generators
Havard Raddum, Lars Hopland Nestasand Kjell Jørgen Hole
An Energy-Efficient Symmetric Cryptography Based Authentication
Scheme for Wireless Sensor Networks
Oscar Delgado-Mohatar, Jose M. Sierra, Ljiljana Brankovic, and
Amparo Fuster-Sabater
12:50-14:00 LUNCH
14:00-15:00 INVITED TALK (JOINT WITH CARDIS)
The Emotion of Identity
Bertrand du Castel
15:00-15:30 COFEE BREAK
15:30-17:00 ANONYMITY/DATABASE SECURITY (SESSION 10)
The Market Failure of Anonymity Services
Heiko Roßnagel
Exploiting Node Mobility for Coordinating Data Usage in Crisis
Scenarios
Giovanni Russello and Enrico Scalavino
Predicting and Preventing Insider Threat in Relational Database
Systems
Qussai Yaseen and Brajendra Panda
17:00-17:30 WRAP-UP, FAREWELL AND ANOUNCEMENT OF WISTP 2011
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment