Thursday September 12th 2013 | Friday September 13th 2013 | |
08:00 - 09:00 | Registration | |
09:00 - 09:30 | General Welcome (Main auditorium) | |
09:30 - 10:30 | Session 1: KEynote speech. Fabio Martinelli (IIT-CNR) | Session 5: Intrusion detection |
10:30 - 11:00 | Tea/Coffee Break | Closing |
11:00 - 13:00 | Session 2: Cryptographic Protocols | |
13:00 - 14:15 | Lunch (Windsor Foyer) | |
14:15 - 15:45 | Session 3: Digital Signatures | |
15:45 - 16:15 | Tea/Coffee Break | |
16:15 - 17:45 | Session 4: Trust - secret proving | |
19:00 - 20:00 | Pre dinner Drinks | |
20:00 - 23:00 | Workshops Dinner |
Session 1: Cryptographic Protocols
Jean Lancrenon. What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange
Nicolas Buchmann and Harald Baier. Towards a more secure and scalable verifying PKI of eMRTD
Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki and Miroslaw Kutylowski. Mutual Restricted Identification
Session 2: Digital Signatures
Christina Brzuska, Henrich C. Pöhls and Kai Samelin. Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures
Johannes Braun, Franziskus Kiefer and Andreas Hülsing. Revocation & Non-Repudiation: When the first destroys the latter
Felipe Carlos Werlang, Martín Vigil and Ricardo Felipe Custódio. A User-Centric Digital Signature Scheme
Session 3: Trust – secret proving
Klaus Potzmader, Daniel Hein and Johannes Winter. STUNT: A Simple, Transparent, User-centered Network of Trust
Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser. Trust Views for the Web PKI
Sébastien Canard, Iwen Coisel, Amandine Jambert and Jacques Traore. New Results for the Practical Use of Range Proofs
Session 4: Intrusion detectionIoanna Kantzavelou and Sokratis Katsikas. Uncertainty in Intrusion Detection Signaling Games
Georgios Spathoulas, Sokratis Katsikas and Anastasios Charoulis. A test-bed for post-processing the results of intrusion detection systems