Nordsec 2004


[ Nordsec 2004 ]

[ Call for papers ]
     Author Information

[ Programme ]

[ Register ]

[ About the conference site ]

[ Programme committee ]

[ Organising committee ]

MicroSoft
Nokia research
Ericsson

Programme

Wednesday, 3 November 2004
17:00-20:00 Registration (doors close at 20:00)
17:00-23:00 Welcome Reception and Sauna, Computer Science Building, HUT, Espoo

Thursday, 4 November 2004
9:00-9:45 Registration
9:45-10:00 Welcome
10:00-11:00 Session I
Daniel Cvrcek
Dynamics of Reputation
G. Navarro, J. Garcia, J. A. Ortega-Ruiz
Chained and Delegable Authorization Tokens
11:00-11:30 Coffee Break
11:30-12:30 Session II
Pentti Tarvainen
Survey of the Survivability of IT Systems
Martin Boldt, Bengt Carlsson, Andreas Jacobsson
Exploring Spyware Effects
12:30-13:30 Lunch
13:30-15:00 Session III
Marco Giunti
Security Properties for Intrusion Detection
Karin Sallhammar, Svein J. Knapskog
Using Game Theory in Stochastic Models for Quantifying Security
Jussipekka Leiwo
A Technique for Modeling and Analysis of Common Criteria Security Environments and Security Objectives
15:00-15:30 Coffee Break
15:30-17:00 Session IV
Sandro Grech, Jani Nikkanen
A Security Analysis of Wi-Fi Protected AccessTM
Marko Schuba, Volker Gerstenberger, Paul Lahaije
Internet ID - Flexible Re-use of Mobile Phone Authentication Security for Service Access
Geir M. Køien
Principles for Cellular Access Security
19:00 Conference Dinner, Haikaranpesä

Friday, 5 November 2004
9:00-10:00 Keynote: Urpo Ilmonen, Director, Chief Security Officer, Nokia Oyj.
Security Requirements in Real Life
10:00-10:30 Session V
Sven Laur, Helger Lipmaa
On Private Similarity Search Protocols
10:30-11:00 Coffee Break
11:00-12:30 Session VI
Ragni R. Arnesen, Jerker Danielsson, Bjørn Nordlund
Carnival - An Application Framework for Enforcement of Privacy Policies
Gergely Tóth, Zoltán Hornák, Ferenc Vajda
Measuring Anonymity Revisited
Anand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun
The Location Information Preference Authority: Supporting User Privacy in Location Based Services
12:30-13:30 Lunch
13:30-14:30 Session VII
Lillian Kråkmo, Marie Elisabeth Gaup Moe
An Attack on the Stream Cipher Whiteout
Kaarle Ritvanen, Kaisa Nyberg
Upgrade of Bluetooth Encryption and Key Replay Attack
14:30-15:00 Coffee Break
15:00-16:30 Session VIII
J. Garcia, F. Autrel, J. Borrell, Y. Bouzida, S. Castillo, F. Cuppens, G. Navarro
Preventing Coordinated Attacks via Alert Correlation
Jarmo Mölsä
Mitigating DoS Attacks against the DNS with Dynamic TTL Values
Emmanuel Guiton
A Distributed Defence Mechanism against Low-Bandwidth TCP SYN Flooding Attacks
16:30 Announcements and Adjourn


Last modified: Wed Nov 24 14:18:40 FLE Standard Time 2004