Programme
Monday, 20 March
Afternoon | Socio-economic and game-theoretical issues (part 1) |
“Multiple Objectives of Lawful-Surveillance Protocols” Joan Feigenbaum and Bryan Ford | |
“Getting security objectives wrong: a cautionary tale of an Industrial Control System” Simon Foley | |
“Assuring the safety of asymmetric social protocols” Virgil Gligor and Frank Stajano | |
“Simulating Perceptions of Security” Paul Wernick, Bruce Christianson and Joseph Spring |
Tuesday, 21 March
Morning | Protocols and cryptography (part 1) |
“Self Attestation of Things” Partha Das Chowdhury and Bruce Christianson | |
“Making decryption accountable” Mark Ryan | |
“Extending Full Disk Encryption for the Future” Milan Broz | |
“Key exchange with the help of a public ledger” Thanh Bui and Tuomas Aura | |
Afternoon | Socio-economic and game-theoretical issues (part 2) |
“Reconciling Multiple Objectives – Politics or Markets?” Ross Anderson and Khaled Baqer | |
“The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations” Fabio Massacci, Nam Ngo, Jing Nie, Daniele Venturi and Julian Williams | |
“A Security Perspective on Publication Metrics” Hugo Jonker and Sjouke Mauw | |
“Controlling Your Neighbors Bandwidth For Fun and Profit” Jonathan Weekes and Shishir Nagaraja |
Wednesday, 22 March
Morning | Protocols and cryptography (part 2) |
“Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come” Marcus Völp, Francisco Rocha, Jérémie Decouchant, Jiangshan Yu and Paulo Verissimo | |
“Security from disjoint paths: is it possible?” Sergiu Costea, Marios O. Choudary and Costin Raiciu | |
“End to End Security is Not Enough” Dylan Clarke and Taha Ali | |
“Auditable PAKEs: Approaching Fair Exchange Without a TTP” Bill Roscoe and Peter Y A Ryan |