[Om-announce] [WISTP 2011] Early bird registration deadline April 30, 2011

sara.foresti at unimi.it sara.foresti at unimi.it
Thu Apr 21 11:35:35 CEST 2011


[Apologies if you receive multiple copies of this message]

***********************************************
Early bird registration deadline April 30, 2011
***********************************************

CALL FOR PARTICIPATION 

***********************************************************************
FIFTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2011)
Security and Privacy of Mobile Devices in Wireless Communication
June 1-3, 2011, Heraklion, Crete, Greece - http://www.wistp.org/
***********************************************************************

ABOUT THE CONFERENCE

WISTP is an annual international workshop covering research in security 
and privacy of mobile communications and related services. The workshop 
seeks submissions from academia and industry presenting novel research 
on all theoretical and practical aspects of security and privacy of 
mobile and smart devices, as well as experimental studies of fielded 
systems based on wireless communication, the application of security 
technology, the implementation of systems, and lessons learned. 
The conference will be a 3-day event featuring technical presentations 
of 19 full papers and 8 short papers. It also includes three keynote 
speeches.

The 5th Workshop in Information Security Theory and Practice (WISTP 2011)
will be held in Heraklion, Crete, Greece.


REGISTRATION

Registration information is available at
http://www.wistp.org/registration-information/


PROGRAM

Tuesday, May 31, 2011
---------------------

18:00 - 20:30 Registration

20:30 Welcome cocktail

------------------------------------------------------------------

Wednesday, June 1, 2011
---------------------

8:30 - 9:30 Registration

9:30 - 9:45 Welcome

9:45 - 10:30 Keynote speaker: Prof. David Naccache

- Can Code Polymorphism Limit Information Leakage?
  (a common work with Antoine Amarilli, Sascha Muller, Daniel Page, 
   Pablo Rauzy, and Michael Tunstall)

10:30 - 11:00 Coffee break

11:00 - 12:30 HARDWARE IMPLEMENTATION

- A Cryptographic Processor for Low-Resource Devices: Canning ECDSA 
   and AES like Sardines
  (Michael Hutter, Martin Feldhofer, and Johannes Wolkerstorfer)

- An Evaluation of Hash Functions on a Power Analysis Resistant 
   Processor Architecture
  (Simon Hoerder, Marcin Wojcik, Stefan Tillich, and Dan Page)

- A Comparison of Post-Processing Techniques for Biased Random Number 
   Generators	
  (Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, 
   Khoongming Khoo, and Chik-How Tan)

12:30 - 14:00 Lunch

14:00 - 15:30 ALGORITHMS

- Formal Framework for the Evaluation of Waveform Resynchronization 
   Algorithms
  (Sylvain Guilley, Karim Khalfallah, Victor Lomne, and Jean-Luc Danger)

- Solving DLP with Auxiliary Input over an Elliptic Curve Used in 
   TinyTate Library
  (Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda)

- Information Leakage Discovery Techniques to Enhance Secure Chip Design
  (Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia)

15:30 - 16:00 Coffe Break

16:00 - 17:30 SECURITY AND TRUST

- Formal Analysis of Security Metrics and Risk
  (Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin)

- STORM - Collaborative Security Management Environment	
  (Theodoros Ntouskas, George Pentafronimos, and Spyros Papastergiou)

- Trust Agreement in Wireless Mesh Networks
  (Andreas Noack)

------------------------------------------------------------------

Thursday, June 2, 2011
----------------------

8:00 - 9:00 Registration

9:00 - 10:30 SECURITY ATTACKS

- A SMS-Based Mobile Botnet Using Flooding Algorithm
  (Jingyu Hua and Kouichi Sakurai)

- FIRE: Fault Injection for Reverse Engineering	
  (Manuel San Pedro, Mate Soos, and Sylvain Guilley)

- Hardware Trojan Side-Channels Based on Physical Unclonable Functions
  (Zheng Gong and Marc X. Makkes)

10:30 - 11:00 Coffee break

11:00 - 12:30 LIGHTWEIGHT AUTHENTICATION

- SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
  (Chunhua Chen, Chris J. Mitchell, and Shaohua Tang)

- An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol 
   with Tag Control 
  (Paolo D'arco)

- Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
  (Mark Manulis and Bertram Poettering)

12:30 - 14:00 Lunch

14:00 - 15:00 Keynote speaker: Prof. Pim Tuyls

- New Developments in Hardware Intrinsic Security

15:00 - 16:00 SECURITY AND CRYPTOGRAPHY

- AES Variants Secure Against Related-Key Differential and Boomerang 
   Attacks
  (Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, and 
   Axel Poschmann)

- Leakage Squeezing Countermeasure Against High-Order Attacks
  (Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger)


16:00 - 16:30 Coffe Break

16:30 - 17:50 SECURITY ATTACKS AND MEASURES (SHORT PAPERS)

- Differential Fault Analysis of the Advanced Encryption Standard using 
   a Single Fault
  (Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali)

- Entropy of Selectively Encrypted Strings
  (Reine Lundin and Stefan Lindskog)

- Practical Attacks on HB and HB+ Protocols
  (Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, and 
   Marcin Zawada)

- Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 
   G-2 Standard
  (Mohammad Hassan Habibi, Mahdi R. Alagheband, and Mohammad Reza Aref)


20:00 Gala Dinner

------------------------------------------------------------------

Friday, June 3, 2011
------------------------

9:00 - 9:30 Registration

9:30 - 10:30 Keynote speaker: Prof. Reinhard Posch

- eID and eSignature with mobile devices - a contribution to the 
   Digital Agenda

10:30 - 11:00 Coffe Break

11:00 - 12:00 MOBILE AUTHENTICATION AND ACCESS CONTROL

- Mobile Electronic Identity: Securing Payment on Mobile Phones	
  (Chen Bangdao and A.W. Roscoe)

- Role-based Secure Inter-operation and Resource Usage Management 
   in Mobile Grid Systems
  (Antonios Gouglidis and Ioannis Mavridis)

12:30 - 14:00 Lunch

14:00 - 15:20 MOBILE APPLICATION SECURITY AND PRIVACY (SHORT PAPERS)

- Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless 
   Network
  (Kun Peng)

- Privacy Respecting Targeted Advertising for Social Networks
  (Christian Kahl, Stephen Crane, Markus Tschersich, and Kai Rannenberg)

- Privacy Protection for Smartphones: An Ontology-Based Firewall
  (Johann Vincent, Christine Porquet, Maroua Borsali, and Harold Leboulanger)

- A Study on the Security, the Performance and the Penetration of Wi-Fi 
  Networks in a Greek Urban Area
  (Savvas Mousionis, Alex Vakaloudis, and Costantinos Hilas)

15:20 - 16:00 Farewell (Wrap-up, Farewell, and Announcement of WISTP 2012)

17:00 Social Event: Visit to the Knossos archaeological site

MORE INFORMATION

Additional information about the conference can be found at
http://www.wistp.org/


More information about the Om-announce mailing list