Programme

Page

Time

Speaker

Title

Authors

Wednesday

 

10:15

 

Introduction and Administration

 

1

10:30

Giampaolo Bella

A protocol's life after attacks

Giampaolo Bella, Stefano Bistarelli, Fabio Massacci

9

11:00

Pierangela Samarati

Towards Flexible Credential Negotiation Protocols

Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati

15

11:30

N. Asokan

Man-in-the-Middle in Tunnelled Authentication Protocols

N. Asokan, Valtteri Niemi, Kaisa Nyberg

 

(lunch)

 

25

14:00

Simon N Foley

Towards an Architecture for Autonomic Security Protocols

Simon N Foley, Hongbin Zhou

31

14:30

Geraint Price

Client v Server side protocols, interfaces and storage

Geraint Price

37

15:00

Virgil Gligor

Guaranteeing Access in Spite of Distributed Service-Flooding Attacks

Virgil Gligor

 

(break)

 

39

16:00

Victoria Stavridou

Protocol Codesign

Hassen Saidi, Victoria Stavridou, Bruno Duterte

47

16:30

Bogdan C Popescu

Expressing security policies for distributed objects applications

Bogdan C Popescu, Bruno Crispo, Andrew S Tanenbaum, Maas Zeeman

Thursday

51

09:30

Mads Dam

Regular SPKI

Mads Dam

67

10:00

Birgit Pfitzmann

Federated Identity-Management Protocols Where User Authentication Protocols May Go

Birgit Pfitzmann, Michael Waidner

 

(break)

 

 

11:00

Michael Roe (chair)

Panel Session: Is protocol modelling finished?

 

89

 

Chris J Mitchell

Disappearing authentication (disappearing security?)

Chris J Mitchell

93

 

P Y A Ryan

Enforcing the Unenforceable

P Y A Ryan

97

 

Lawrence C Paulson

Is the Verification Problem for Cryptographic Protocols Solved?

Giampaolo Bella, Cristiano Longo, Lawrence C Paulson

105

 

Bruce Christianson

Secure Sessions from Weak Secrets

Bruce Christianson, Michael Roe, David Wheeler

 

(lunch)

 

125

14:00

Matt Blaze

Protocols for anonymity in wireless networks

Matt Blaze, John Ioannidis, Angelos Keromytis, Tal Malkin, Avi Rubin

127

14:30

Pekka Nikander

Limitations of Ipsec Policy Mechanisms

Jari Arkko, Pekka Nikander

 

(break)

 

137

15:30

Wenbo Mao

Deniable Identity-Based Key Establishment with Provable Security

Colin Boyd, Wenbo Mao, Kenneth Paterson

151

16:00

Alec Yasinsac

Protocols for a Dynamic Key Exchange System for Ad Hoc Networks

Alec Yasinsac, Mike Burmester

Friday

159

10:00

Kamil Kulesza

Addressing new challenges by building security protocols around graphs

Kamil Kulesza, Zbigniew Kotulski

163

10:30

Brian Monahan

From Security Protocols to Systems Security: A case for systems security modeling tools

Brian Monahan

 

(break)

 

177

11:30

Fabio Martinelli

Biometrics to Enhance Smartcard Security

Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli

187

12:00

James Malcolm

Blind publication

James Malcolm

 

(lunch, and end of workshop)

 

Last Updated on 26/03/03 by James A. Malcolm