Font Size: research conference europe communications workshop

Technical Program

Wednesday, June 3, 2009
08:30 - 09:15Registration
09:15 - 09:30 Opening remarks by General Chairs
09:30 - 10:15  PDF Keynote talk - "EU funded Trust and Security Research in FP7" by Bart van Caenegem (European Commission)
10:30 - 11:00Coffee break
11:00 - 12:30 Session I "Protocols & Cryptography." Chair: Joakim Koskela
PDF Chae Duk Jung, Chul Sur, Yougho Park, Kyung-Hyune Rhee  A Robust Conditional Privacy-Preserving Authentication Protocol in VANET
PDF Jan Khroviak, Vashek Matyas, Jiri Zizkovsky  Generating Random and Pseudorandom Sequences in Mobile Devices
PDF Michelle Graham, David Gray  Protecting Privacy & Securing the Gathering of Location Proofs - the Secure Location Verification Proof Gathering Protocol
PDF Abhishek Parakh, Subhash Kak  A Distributed Data Storage Scheme for Sensor Networks
12:30 - 14:00Lunch
14:00 - 18:00 Tutorial "The Host Identification Protocol" by Andrei Gurtov (Helsinki Institute of Information Technology)
Thursday, June 4, 2009
09:00 - 10:30 Session II "Ad hoc & Wireless Sensor Networks." Chair: Michelle Graham
PDF Dang Quan Nguyen, Louise Lamont, Peter Mason  On Trust Evaluation in Mobile Ad hoc Networks
PDF Gianni Fenu, Gary Steri  Safe, fault tolerant and capture-resilient environmental parameters survey using WSNs
PDF Mathieu David, Neeli R Prasad  Providing strong Security and high privacy in low-cost RFID networks
10:30 - 11:00Coffee break
11:00 - 12:30 Session III "Communication Security." Chair: Jean-Frédéric Wagen
Juho Heikkila, Andrei Gurtov  Filtering SPAM in P2PSIP communities with web of trust
Dmitriy Kuptsov, Andrei Gurtov  SAVAH: Source Address Validation with Host Identity Protocol
PDF Reiner Dojen  Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
PDF Joakim Koskela, Sasu Tarkoma  Simple Peer-to-Peer SIP Privacy
12:30 - 14:00Lunch
14:00 - 15:30 Session IV "Networks & Applications." Chair: Jean-Pierre Seifert
PDF Jean-Frédéric Wagen, Danmien Vionnet  A rich client-server based framework for convenient security and management of mobile applications
PDF Mike V Meyerstein  Security Aspects of Smart Cards in Machine to Machine (M2M) Advanced Mobile Network Applications
PDF Jay Ligatti, Billy Rickey, Nalin Saigal  LoPSiL: A Location-based Policy-specification Language
PDF Jorn M. J. Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart De Decker  Extending the Belgian eID technology with mobile security functionality
15:30 - 16:00Coffee break
14:00 - 15:30 Special Session "EU Projects." Chair: Giovanni Russello
PDF Gianluca Ramunno (Politecnico di Torino, Italy)  OpenTC - Open Trusted Computing, an overview
PDF Antonio F. Gómez Skarmeta (University of Murcia, Spain)  A cross-layer approach to Identity Management solution in networking: The SWIFT approach
19:00 - 22:00Social dinner
Friday, June 5, 2009
09:00 - 10:30 Session V "Trust in Mobile Networks." Chair: Marco Hauri
PDF Jean-Pierre Seifert, Xinwen Zhang, Onur Aciicmez  Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms
PDF Daniel M. Hein, Ronald Toegl  An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response
PDF Maria Chiara Laghi, Michele Amoretti, Gianni Conte  Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP
10:30 - 11:00Coffee break
09:00 - 10:30 Session VI "Communication Security." Chair: Jean-Frédéric Wagen
PDF Rainer Falk, Dirk Kröselberg, Christian Günther, Avi Lior  Mobile WiMAX Network Security
PDF Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka  Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna
Nam H. Nguyen, Yoichi Shinoda  On modeling viral diffusion in heterogeneous wireless networks
12:30 - 14:00Lunch and closing
Dates & News

Conference date
June 3. - 5., 2009

Conference Dates

Paper Submission Deadline
February 2, 2009
February 16, 2009 (Extended)

Notification of Acceptance:
March 16, 2009

Camera-ready Manuscripts due:
April 8, 2009

Technical Sponsorship
CreateNet Novalyst
Sponsor
ICST - The Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering