|
CMS 2002 SCHEDULE
Over twenty high quality presentations accompanied with three keynote speeches will take place in Portoroz at the CMS 2002.
Thursday, September 26, 2002
9:00 - 9:15
|
|
Welcome |
9:15 - 10:00
|
|
Keynote speech |
10:00 - 11:00
|
|
Karl Scheibelhofer: Validation of long-term Signatures: About Revocation Checking of Certificates in the Context of longterm Signatures
Sean Smith, K. Kain, R. Asokan: Digital Signatures and Electronic Documents: A Cautionary Tale |
11:00 - 11:30
|
|
Break |
11:30 - 13:00
|
|
Andr Ventura Zquete: Improving the functionality of SYN cookies
Tadauchi Masaharu, Ishii Tatsuei, Itoh Susumu: A MAC-Layer Security Architecture for Cable Networks Edgar Weippl, W. Essmayr, F. Gruber, W. Stockner, T. Trenker: Towards Authentication Using Mobile Devices |
13:00 - 14:30
|
|
Lunch |
14:30 - 16:00
|
|
Pietro Michiardi, Refik Molva: CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks
Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva: Enabling Adaptive and Secure Extranets
Alain Pannetrat, Refik Molva: Multiple Layer Encryption for Multicast Groups |
16:00 - 16:30
|
|
Break |
16:30 - 18:00
|
|
Bogdan Popescu, Chandana Gamage, Andrew S. Tanenbaum: Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System
Dimitris Raptis, Theo Dimitrakos, Bjoern Axel Gran, Ketil Stoelen: The CORAS approach for model-based risk management applied to e-commerce domain Duan Gabrijelcic, Arso Savanovic, Borka Jerman-Blaic: Towards Security Architecture for Future Active IP Networks |
20:00
|
|
Social event with dinner |
Friday, September 27, 2002
9:00 - 9:45
|
|
Keynote speech |
9:45 - 10:30
|
|
Keynote speech |
10:30 - 11:00
|
|
Mohamed Al-Ibrahim, Josef Pieprzyk: Authentication of Transit Flows and k-Siblings One-time Signature |
11:00 - 11:30
|
|
Break |
11:30 - 13:00
|
|
Chris J. Mitchell, Namhyun Hur: On the security of a structural proven signer ordering multisignature scheme
Sattam Al-Riyami, Chris J. Mitchell: Renewing Cryptographic Timestamps
Wolfgang Bauer: Implementing Elliptic Curve Cryptography |
13:00 - 14:30
|
|
Lunch |
14:30 - 16:00
|
|
Martin Steinebach, Jana Dittmann, Eva Saar: Combined fingerprinting Attacks against Digital Audio Watermarking: Methods, Results and Solutions
Martina Podesser, Andreas Uhl: Selective Encryption of Visual Data
Vclav Maty, Zdenek Riha: Biometric Authentication - Security and Usability |
16:00 - 16:30
|
|
Break |
16:30 - 18:00
|
|
Arno Hollosi, Udo Payer, Reinhard Posch: Automatic Authentication using the Austrian Citizen Card
Arno Hollosi, Herbert Leitold, Reinhard Posch: An Open Interface Enabling Secure e-Government
Gaper Lavreni, Borka Donova-Jerman, Aleksej Blai: CADENUS Security Considerations
|
Back to CMS 2002 main page.
|
|
|
|