Program



 

Day 0: September 1, 2009
17h30-19h00 Registration
20h00 WISTP2009 Welcome cocktail

Day 1: September 2, 2009 (Workshop Day 1)
8h15-9h00 Registration
9h00-9h15 Introduction
9h15-10h15 Steve Purser (ENISA), Security Challenges For Future System
10h15-10h45 Coffee break
10h45-12h15

Session: MOBILITY

  • On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
    Olivier Heen, Gilles Guette and Thomas Genet
    INRIA, Université Rennes 1
  • A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
    Marc Jaimez, Oscar Esparza and Jose L. Muñoz
    Universitat Politecnica de Catalunya
  • Privacy – Aware Location Database Service for Granular Queries
    Shinsaku Kiyomoto, Keith M. Martin, and Kazuhide Fukushima
    KDDI Laboratories and Royal Holloway University of London

12h15-14h00 Lunch
14h00-15h00 Gildas Avoine (UCL), The Future Security Challenges in RFID
15h00-16h30

Session: ATTACKS AND SECURE IMPLEMENTATIONS

  • Algebraic Attacks on RFID Protocols
    Ton van Deursen and Sasa Radomirovic
    University of Luxembourg
  • Anti-Counterfeiting using Memory Spots
    Helen Balinsky, Edward McDonnell, Liqun Chen and Keith Harrison
    Hewlett Packard Laboratories
  • On Second – Order Fault Analysis Resistance for CRT – RSA Implementations
    Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain and Yannick Sierra
    Oberthur Technologies and University of Luxembourg

16h30-17h00 Coffee break
17h-18h30 Poster session
18h30 Invited Drink

Day 2: September 3, 2009 (Workshop Day 2)
8h45-9h15 Registration
9h15-10h15 Jean Pierre Delesse, Which security for the M2M eco-system?
10h15-10h45 Coffee break
10h45-12h15

Session: PERFORMANCE AND SECURITY

  • Measurement Analysis when Benchmarking Java Card Platforms
    Samia Bouzefrane, Julien Cordry and Pierre Paradinas
    CNAM/Cedric
  • Performance issues of Selective Disclosure and Blinded Issuing Protocols on Java Card
    Hendrik Tews and Bart Jacobs
    Radboud Universiteit Nijmegen, The Netherlands
  • Energy – Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
    Christian Lederer, Roland Mader, Manuel Koschuch, Johann Groszschaedl,
    Stefan Tillich, and Alexander Szekely
    University of Klagenfurt, Graz University of Technology, FH Campus
    Wien, and University of Bristol

12h15-13h45 Lunch
14h00-15h00 Doug Tygar (UC Berkeley), Privacy and Computer Security
15h00-15h30 Coffee break
15h30-18h00 Management of Assurance & Security Metrics in Service Orchestration (MASTER session)
20h30 Gala Dinner

Day 3: September 4, 2009 (Workshop Day 3)
8h45-9h15 Registration
9h15-10h15 Vincent Rijmen (KULeuven), The first 10 years of Advanced Encryption
10h15-10h45 Coffee break
10h45-12h15

Session: CRYPTOGRAPHY

  • Key Management Schemes for Peer – to – Peer Multimedia Streaming Overlay Networks
    Juan Álvaro Muñoz Naranjo, Juan Antonio López Ramos and Leocadio González Casado
    Universidad de Almería
  • Ultra-lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure
    Keith M. Martin and Maura B. Paterson
    Royal Holloway and University of London
  • PKIX Certificate Status in MANET
    J. Muñoz, O. Esparza, C. Gañán and X. Arnau
    Universitat Politecnica de Catalunya

12h15-12h45 Awards ceremony, end of WISTP2009 and announcement of WISTP2010
12h45-14h00 Lunch
14h00-17h00 Social event