Draft Agenda
DAY 1 - November 7, 2011
8:30 - 9:00 |
Check‐in and Coffee Reception |
9:00 - 9:15 |
Welcome & Opening Remarks
Donna Dodson, Chief, NIST/ITL/Computer Security Division |
9:15 - 10:00 |
Workshop Keynote: Turning Points in Cryptography
Dr. Whitfield Diffie, Chief Cryptographer, Revere Security |
10:00 - 10:25 |
Crypto Strength and Attacks,
John Kelsey, NIST |
10:25 - 10:35 |
Constrained Environments and Many‐Core Devices,
Larry Bassham, NIST |
10:35 - 10:50 |
Pairing Based Cryptography,
Dustin Moody, NIST |
10:50 - 11:05 |
Coffee Break |
11:05 - 11:30 |
Cryptography for Highly Constrained Networks,
Rene Struik, Struik Security Consultancy |
11:30 - 11:55 |
Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking,
Apurva Mohan, Honeywell ACS Labs |
11:55 - 12:20 |
FIPS‐140‐2 Validation of OpenSSL for Android Devices,
Tom Karygiannis, NIST and Steve Marquess, OpenSSL Foundation
|
12:20 - 12:45 |
Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors,
Katrin Hoeper, Motorola Solutions, Inc. |
12:45 - 13:45 |
Lunch Break |
13:45 - 14:10 |
Compact Asymmetric Authentication using Hash‐based Signatures,
David McGrew, CISCO |
14:10 - 14:35 |
Stream Ciphers for Constrained Environments,
Meltem Sonmez Turan, NIST |
14:35 - 15:00 |
A Framework for the Evaluation of Physical Unclonable Functions,
Abhranil Maiti, Virginia Tech |
15:00 - 15:15 |
Coffee Break |
15:15 - 15:40 |
A Symmetric Key Generation System (KGS) Suitable for Sensor/Building Networks,
David McGrew, CISCO |
15:40 - 16:05 |
Key Security Challenges in Smart Swarm of Things (SSoT),
Oscar Garcia‐Morchon, Philips Research Europe |
16:05 - 16:30 |
Securing the Next Wave of Technology,
Dr. Daniel Engels, CTO, Revere Security |
16:30 |
Closing Remarks for the Day |
DAY 2 - November 8, 2011
8:30 - 9:00 |
Check‐in and Coffee Reception |
9:00 - 9:10 |
Welcome & Opening Remarks
Tim Polk, NIST |
9:10 - 9:55 |
Workshop Keynote: Introduction to Delay-Tolerant Networks,
Angela Hennessy, Laboratory for Telecommunications Sciences (LTS) |
9:55 - 10:30 |
Cryptographic Module Design with Domain Specific Languages,
John Launchbury, Chief Scientist, Galois |
10:30 - 10:55 |
NIST's Cryptographic Toolkit,
Elaine Barker, NIST |
10:55 - 11:10 |
Coffee Break |
11:10 - 11:35 |
The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies,
Danilo Gligoroski, Department of Telematics, NTNU, Norway |
11:35 - 12:00 |
Secret Sharing and Reliable Cloud Computing,
Yvo Desmedt, University College London |
12:00 - 12:25 |
Privacy-preserving Electronic Transactions,
Rene Peralta, NIST |
12:25 - 12:50 |
Security/Privacy Models for "Internet of things": What should be studied from RFID‐schemes?
Daisuke Moriyama, NICT |
12:50 - 13:50 |
Lunch Break |
13:50 - 14:50 |
Open Floor Discussions |
14:50 |
Closing Remarks & Adjourn |
|