SecureCHAINS Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Security and Privacy of Mobile Devices in Wireless Communication June 1-3, 2011, Heraklion, Crete, Greece

Go down

Security and Privacy of Mobile Devices in Wireless Communication June 1-3, 2011, Heraklion, Crete, Greece Empty Security and Privacy of Mobile Devices in Wireless Communication June 1-3, 2011, Heraklion, Crete, Greece

Post  Admin Thu Apr 21, 2011 7:02 pm

FIFTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2011)
Security and Privacy of Mobile Devices in Wireless Communication

June 1-3, 2011, Heraklion, Crete, Greece - http://www.wistp.org/

WISTP is an annual international workshop covering research in security
and privacy of mobile communications and related services. The workshop
seeks submissions from academia and industry presenting novel research
on all theoretical and practical aspects of security and privacy of
mobile and smart devices, as well as experimental studies of fielded
systems based on wireless communication, the application of security
technology, the implementation of systems, and lessons learned.
The conference will be a 3-day event featuring technical presentations
of 19 full papers and 8 short papers. It also includes three keynote
speeches.

The 5th Workshop in Information Security Theory and Practice (WISTP 2011)
will be held in Heraklion, Crete, Greece.


REGISTRATION

Registration information is available at
http://www.wistp.org/registration-information/


PROGRAM

Tuesday, May 31, 2011
---------------------

18:00 - 20:30 Registration

20:30 Welcome cocktail

------------------------------------------------------------------

Wednesday, June 1, 2011
---------------------

8:30 - 9:30 Registration

9:30 - 9:45 Welcome

9:45 - 10:30 Keynote speaker: Prof. David Naccache

- Can Code Polymorphism Limit Information Leakage?
(a common work with Antoine Amarilli, Sascha Muller, Daniel Page,
Pablo Rauzy, and Michael Tunstall)

10:30 - 11:00 Coffee break

11:00 - 12:30 HARDWARE IMPLEMENTATION

- A Cryptographic Processor for Low-Resource Devices: Canning ECDSA
and AES like Sardines
(Michael Hutter, Martin Feldhofer, and Johannes Wolkerstorfer)

- An Evaluation of Hash Functions on a Power Analysis Resistant
Processor Architecture
(Simon Hoerder, Marcin Wojcik, Stefan Tillich, and Dan Page)

- A Comparison of Post-Processing Techniques for Biased Random Number
Generators
(Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng,
Khoongming Khoo, and Chik-How Tan)

12:30 - 14:00 Lunch

14:00 - 15:30 ALGORITHMS

- Formal Framework for the Evaluation of Waveform Resynchronization
Algorithms
(Sylvain Guilley, Karim Khalfallah, Victor Lomne, and Jean-Luc Danger)

- Solving DLP with Auxiliary Input over an Elliptic Curve Used in
TinyTate Library
(Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda)

- Information Leakage Discovery Techniques to Enhance Secure Chip Design
(Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia)

15:30 - 16:00 Coffe Break

16:00 - 17:30 SECURITY AND TRUST

- Formal Analysis of Security Metrics and Risk
(Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin)

- STORM - Collaborative Security Management Environment
(Theodoros Ntouskas, George Pentafronimos, and Spyros Papastergiou)

- Trust Agreement in Wireless Mesh Networks
(Andreas Noack)

------------------------------------------------------------------

Thursday, June 2, 2011
----------------------

8:00 - 9:00 Registration

9:00 - 10:30 SECURITY ATTACKS

- A SMS-Based Mobile Botnet Using Flooding Algorithm
(Jingyu Hua and Kouichi Sakurai)

- FIRE: Fault Injection for Reverse Engineering
(Manuel San Pedro, Mate Soos, and Sylvain Guilley)

- Hardware Trojan Side-Channels Based on Physical Unclonable Functions
(Zheng Gong and Marc X. Makkes)

10:30 - 11:00 Coffee break

11:00 - 12:30 LIGHTWEIGHT AUTHENTICATION

- SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
(Chunhua Chen, Chris J. Mitchell, and Shaohua Tang)

- An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol
with Tag Control
(Paolo D'arco)

- Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
(Mark Manulis and Bertram Poettering)

12:30 - 14:00 Lunch

14:00 - 15:00 Keynote speaker: Prof. Pim Tuyls

- New Developments in Hardware Intrinsic Security

15:00 - 16:00 SECURITY AND CRYPTOGRAPHY

- AES Variants Secure Against Related-Key Differential and Boomerang
Attacks
(Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, and
Axel Poschmann)

- Leakage Squeezing Countermeasure Against High-Order Attacks
(Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger)


16:00 - 16:30 Coffe Break

16:30 - 17:50 SECURITY ATTACKS AND MEASURES (SHORT PAPERS)

- Differential Fault Analysis of the Advanced Encryption Standard using
a Single Fault
(Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali)

- Entropy of Selectively Encrypted Strings
(Reine Lundin and Stefan Lindskog)

- Practical Attacks on HB and HB+ Protocols
(Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, and
Marcin Zawada)

- Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1
G-2 Standard
(Mohammad Hassan Habibi, Mahdi R. Alagheband, and Mohammad Reza Aref)


20:00 Gala Dinner

------------------------------------------------------------------

Friday, June 3, 2011
------------------------

9:00 - 9:30 Registration

9:30 - 10:30 Keynote speaker: Prof. Reinhard Posch

- eID and eSignature with mobile devices - a contribution to the
Digital Agenda

10:30 - 11:00 Coffe Break

11:00 - 12:00 MOBILE AUTHENTICATION AND ACCESS CONTROL

- Mobile Electronic Identity: Securing Payment on Mobile Phones
(Chen Bangdao and A.W. Roscoe)

- Role-based Secure Inter-operation and Resource Usage Management
in Mobile Grid Systems
(Antonios Gouglidis and Ioannis Mavridis)

12:30 - 14:00 Lunch

14:00 - 15:20 MOBILE APPLICATION SECURITY AND PRIVACY (SHORT PAPERS)

- Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless
Network
(Kun Peng)

- Privacy Respecting Targeted Advertising for Social Networks
(Christian Kahl, Stephen Crane, Markus Tschersich, and Kai Rannenberg)

- Privacy Protection for Smartphones: An Ontology-Based Firewall
(Johann Vincent, Christine Porquet, Maroua Borsali, and Harold Leboulanger)

- A Study on the Security, the Performance and the Penetration of Wi-Fi
Networks in a Greek Urban Area
(Savvas Mousionis, Alex Vakaloudis, and Costantinos Hilas)

15:20 - 16:00 Farewell (Wrap-up, Farewell, and Announcement of WISTP 2012)

17:00 Social Event: Visit to the Knossos archaeological site

MORE INFORMATION

Additional information about the conference can be found at
http://www.wistp.org/

Admin
Admin

Posts : 107
Join date : 2010-10-19

http://securechains.forumattivi.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum