Program

Day 0: May 13, 2008
17h30-19h00 Registration
20h00 WISTP2008 Welcome reception (dinner)
Day 1: May 14, 2008 (Workshop Day 1)
8h30-9h15 Registration
9h15-9h30 Introduction
9h30-10h30 Xavier Larduinat (Eurosmart/Gemalto), Smart Card industry at the horizon 2020
10h30-11h00 Coffee break
11h00-13h00
Session: SMART DEVICES
- Untraceability of RFID Protocols
Ton van Deursen, Sjouke Mauw and Sasa Radomirovic - A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices
Luigi Catuogno, Clemente Galdi - Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information
Matthew Judge, Paul Williams, Yong Kim and Barry Mullins
13h00-14h30 Lunch
14h30-18h30 The Segur@ project https://www.cenitsegura.com/joomla/
The Segur@’s project is an initiative of Telefonica, which is the consortium leader joined by a totally of 12 enterprises that include the most important Spanish firms on the information systems security and telecoms area. 15 Spanish universities are also involved.
CENIT Segur@’s project main goal, is to generate a trust and security framework for the use of the information technologies and communications (TIC) in the e-society. From the present situation, we are going to make a wide investigation work on the basic technologies that are applied to the information security, like: Biometrics, Cryptographic Algorithms, advanced intrusion detection algorithms etc... These activities are going to be complemented with the definition of architectures and protocols that allow apply these basic technologies to achieve the purpose of the project. Next to this, we are going to carry out a legal analysis of all the aspects that are going to be investigated.
- Introduction: The Segur@ Project
TID - Quantum Cryptography applications for an Operator Network
TID – UPM - Electronic olfactory nano-microsystems for recognition in biometrics
Secuware - CSIC - Impact of the security mechanisms on the performance of 802.15.4/ZigBee network
S21Sec - UPC - Break
- Machine learning techniques for malware clasiffication
Panda Security - Authorithation and new services identity federations. DAME
Atos Origin - UMU
18h30 Thanks to SCM Microsystems
19h30 Invited Drink
Day 2: May 15, 2008 (Workshop Day 2)
8h45-9h30 Registration
9h30-10h30 Gene Tsudik, Sensor Self-Defense: How to Withstand Mobile Adversary in Unattended Sensor Networks
10h30-11h00 Coffee break
11h00-13h00
Session: NETWORK SECURITY
- Probabilistic Identification for Hard to Classify Protocol
Elie Bursztein - A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup
Christer Andersson, Markulf Kohlweiss, Leonardo A. Martucci and Andriy Panchenko - Availability for DHT-based Overlay Networks with Unidirectional Routing
Jan Seedorf and Christian Muus
13h00-14h30 Lunch
14h30-15h45 Tutorials and Poster session
- A (short) Tutorial on using Sensor Networks and RFIDs
This tutorial will present the technology and will make it possible for attendees to experiment on sample pieces of hardware.
Serge Chaumette and al.
15h50-16h50 N. Asokan (Nokia), On-board Credentials with Open Provisioning
16h50-17h30 Coffee break
17h30-18h50
Session: CONVERGENCE SECURITY
- Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures
Joaquin Torres, Antonio Izquierdo, Mildrey Carbonell and Jose M. Sierra - Using TPMs to Secure Vehicular Ad-hoc Networks (VANETs)
Gilles Guette and Ciaran Bryce
20h30 Workshop Gala Dinner
Day 3: May 16, 2008 (Workshop Day 3)
8h45-9h30 Registration
9h30-10h50
Session: CRYPTOGRAPHY
- Algebra for Capability Based Attack Correlation
Navneet Kumar Pandey, S. K. Gupta and Shaveta Leekha - On the BRIP Algorithms Security for RSA
Frédéric Amiel and Benoit Feix
10h50-11h20 Coffee break
11h20-12h20 Damien Sauveron, European Funding Opportunities
12h30-13h00 Awards ceremony, end of WISTP2008 and announcement of WISTP2009
13h00-14h30 Lunch
15h30-19h00 Tour in Sevilla