Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
ESAS 2007 -- Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks
[go: Go Back, main page]


ESAS 2007
  Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks

July 2-3, 2007, Cambridge, UK

Kindly sponsored by



  Call for Papers
  Submission (closed)
  Technical Program
  Registration
  Travel information

  Earlier workshops:

 

Workshop Program

Sunday, July 1

1600
Punting on the Cam

Monday, July 2

from 0800
Registration

Session 1: Device Pairing

0900
The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams
Rene Mayrhofer, Lancaster University, UK

0930
Private Handshakes
Jaap-Henk Hoepman, TNO Information and Communication Technology and Radboud University Nijmegen, Holland

1000
Security Associations in Personal Networks: A Comparative Analysis
Jani Suomalainen, VTT Technical Research Centre of Finland
Jukka Valkonen, Helsinki University of Technology and Nokia Research Center, Finland
N.Asokan, Helsinki University of Technology and Nokia Research Center, Finland

1030
Morning break

Keynote Talk

1100
The Craft Of Confidence
Paul Wilson, writer-presenter, BBC's The Real Hustle

Paul Wilson understands how con artists think. The writer/presenter of the hit BBC show The Real Hustle has pulled hundreds of scams to help protect the public. In this presentation, Paul will show how con games work, how con men think and how the public can protect themselves from modern day confidence tricks. Paul clearly illustrates how those who seek to break through walls think differently from those who build them and shows how to protect against scams old and new.

1230
Lunch break

Session 2: Key Management

1400
Key Establishment in Heterogeneous Self-Organized Networks
Gelareh Taban, University of Maryland, US
Rei Safavi-Naini, University of Calgary, Canada

1430
Enabling Full-Size Public-Key Algorithms on 8-bit Sensor Nodes
Leif Uhsadel, Axel Poschmann, Christof Paar, Ruhr-University Bochum, Germany

1500
Key Distribution in Mobile Ad Hoc Networks based on Message Relaying
Johann van der Merwe, Dawoud Dawoud, Stephen McDonald, University of KwaZulu-Natal, South Africa

1530
Afernoon break

Session 3: Location Verification and Location Privacy

1600
Distance Bounding in Noisy Environments
Dave Singelee, Bart Preneel K.U. Leuven, Belgium

1630
Multiple Target Localization in Sensor Networks with Location Privacy
Matthew Roughan, University of Adelaide, Australia
Jon Arnold, Defence Science and Technology Organization, Australia

1700On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
Levente Buttyan, Tamas Holczer, Istvan Vajda, Budapest University of Technology and Economics, Hungary

1930
Workshop banquet, Sidney Sussex College Dining Hall

Tuesday, July 3

Session 4: Secure Routing and Forwarding

0900
End-by-hop Data Integrity
Stephen Farrell, Trinity College, Ireland Christian Jensen, Technical University of Denmark, Denmark

0930
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert, University of Kentucky, Lexington, US

Session 5: Physical Security

1000
Security for mobile low power nodes in a Personal Area Network by means of Trusted Platform Modules
Ulrich Grossmann, Enrik Berkhan, Luciana Jatoba, Joerg Ottenbacher, Wilhelm Stork, Klaus D. Mueller-Glaser, University of Karlsruhe, Germany

1030
ALGSICS --- Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
Jorge Guajardo, Neil Bird, Claudine Conrado, Stefan Maubach, Geert-Jan Schrijen, Boris Skoric, Anton Tombeur, Pim Tuyls, Peter Thueringer
Philips Research Europe, Eindhoven, Holland University of Texas at Brownsville, USA Philips Semiconductors, Gratkorn, Austria

1100
Morning break

1130
Panel Session

1230
Lunch break

Session 6: Detection of Compromise, and Revocation

1400
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Christoph Krauß, Frederic Stumpf, Claudia Eckert, Darmstadt University of Technology, Germany

1430
Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators
Ben Smyth, Mark Ryan, University of Birmingham, UK
Liqun Chen, HP Laboratories, UK

1500
New Strategies for Revocation in Ad-Hoc Networks
Tyler Moore, Jolyon Clulow, Ross Anderson, Shishir Nagaraja, University of Cambridge, UK

1530
Afernoon break

1600
Rump Session

1715
Closing remarks

1730
End of workshop