MONDAY 11.12.2006 | ||
---|---|---|
9:00 | Registration | |
9:15 | Welcome words | Jukka Manner |
9:25 | Identity management and protection | |
Identity Management Systems A Comparison of Current Solutions | Myllyniemi | |
Windows CardSpace | Malinen | |
An Overview of Approaches to Privacy Protection in RFID | Kjällman | |
10:40 | Break | |
11:00 | MANET and WLAN | |
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem | Jimenez | |
Overview of WLAN security | Hassinen | |
Usability of WLAN Hotspots Access: a Literature Review | Karvonen | |
12:15 | Lunch break | |
13:15 | Home networking | |
How Do People Use Security in the Home | Lahtela | |
Access Control in Home Networking | Tornberg | |
14:05 | Security protocols | |
Better-Than-Nothing security | Aula | |
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves | Brumley | 14:55 | Break |
15:15 | VoIP, NAT/Firewall traversal and SIP | |
IT Security Evaluation of Skype in Corparate Networks | Korpela | |
NAT/Firewall traversal: Issues and solutions | Atout | |
User authentication in SIP | Vesterinen | |
16:30 | Summary of the first day | |
16:40 | The end | |
TUESDAY 12.12.2006 | ||
9:00 | Welcome back | |
9:15 | Privacy and ethics | |
Are we living in 1984 | Kolehmainen | |
Role of Ethics in Pervasive Computing Security | Lipasti | |
10:05 | Peer-to-peer Systems | |
Comparison of Trust Model in Peer to Peer System | Ren | |
Attacks Against Peer-to-peer Networks and Countermeasures | Wang | |
10:55 | Break | |
11:15 | Authentication architectures and systems | |
Distributed AAA | Kavuri | |
Generic Authentication Architecture | Olkkonen | |
Authentication in eTKK | Liljavirta | |
12:30 | Summary of the seminar | |
12:40 | The end |