Organizers:
Computer Science and Communications (CSC) research UnitInterdisciplinary Centre for Security, Reliability and Trust

Partners:

University of LuxembourgInstytut Podstaw Informatyki Polskiej Akademii NaukWarsaw University of Technology - Politechnika WarszawskaFond National de la Recherche du Luxembourg

 

Program

You can download the final program in PDF.

 

The workshop will be divided in tracks as follows: Each talk should target a length of 20 minutes with an addition of 5 minutes of for questions.

The detailed program is as follows:

 

(top)

Day 1 (Thursday May 6, 2010)


8h - Registration of the participants
9h - Opening session
Short introduction by the officials from the University of Luxembourg, Polish Academy of Sciences and Warsaw University of Technology
9h20 - Invited speakers
Mrs. Barbara LabudaPolish Ambassador in Luxembourg
Mr. Germain DondelingerCommissaire du Gouvernement
10h - Coffee break
10h30 - Session 1: Information Security Management
Peter RyanSecurity and Trust in Voting Systems
Wojciech Mazurczyk & Krzysztof SzczypiorskiInformation Hiding in Communication Protocols: Network Steganography
Ralph-Phillipp WeinmannOn Temporal Memory Errors
Christoph SchommerData Mining in Security Applications
12h - Lunch at the castle restaurant
14h - Session 2: Cryptography and Privacy I
Alex Biryukov and Ivica NikolicAutomatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
Miroslaw Szaban and Franciszek SeredynskiConstructing Cellular Automata - based S-boxes
Sjouke Mauw, Sasa Radomirovic and Mohammad Torabi DashtiMinimal message complexity of asynchronous multi-party contract signing
Hugo Jonker and Jun PangQuantifying Voter-controlled Privacy
15h40 - Coffee break
16h - Session 3: Protocol & Model Checking
Wojtek JamrogaMarkov Temporal Logic
Ton van Deursen and Sasa RadomirovicOn the non-compositionality of untraceable RFID protocols
Wojciech PenczekModel Checking of (Timed) Security Protocols
Miroslaw KurkowskiVerifying (Timed) Security Protocols with VerICS
20h - Gala dinner (Mansfeld Restaurant)
See Social event.

 

(top)

Day 2 (Friday May 7, 2010)


9h - Session 4: Cryptography and Privacy II
Franck Leprevost Rational torsion points of Jacobians of modular-like genus 2 curves
Andrzej Paszkiewicz On properties and applications of special types irreducible polynomials over small finite fields
Guillaume AucherPrivacy policies with dynamic logic
10h15 - Coffee break
10h45 - Session 5: Network Security
Zbigniew Kotulski, Bogdan Ksiezopolski, Pawel Szalachowski Calculating security metrics for security protocols: a proof of concept
Marek Ostaszewski On Capturing Vital Properties of Denial of Service Attacks Using Metaheuristic Approaches
Jaroslaw Skaruz and Franciszek Seredynski Tracking Intruders in Web Application
12h - Lunch at the castle restaurant
14h - Session 6: Trust, Reputation and Security Assessment
Eugen Staab Reliable Information Acquisition in the Presence of Attackers
Christoph Schommer and Jayanta Poray Recommending Trust in Conversational Streams By Explorative Mind-Maps
Barbara Kordy and Patrick Schweitzer Attack-Defense Trees
15h20 - Closing session and coffee break
18h - Debriefing session
Debriefing session involving the heads of the involved institutions on the future collaboration (4 persons).