| Monday, 26 June 2006 |
| 09:00 |
Tamper Proof Devices:State of the Art, L. Csik (BUTE/Sevecom): |
| 09:45 |
Philips security products, X. Serret (Philips/Sevecom) |
| 10:10 |
Coopers Project, L. Bousis (Philips/Sevecom) |
| 10:30 |
Break
|
| 10:45 |
Secure Communication Protocols: State of the Art, Z. Ma (Univ. Ulm/Sevecom) |
| 11:30 |
Discussion on tamper proof devices and secure communication for C2C |
| 12:00 |
Lunch
|
| 13:00 |
CVIS Project, T. Ernst (INRIA/CVIS) |
| 13:15 |
Privacy and Identity Management: State of the Art, P. Papadimitratos (EPFL/Sevecom) |
| 13:45 |
Identity Management: Modinis-IDM Study on Interoperability, D. De Cock (KUL/Modinis-IDM) |
| 14:30 |
GST Security Aspects: Overview, D. De Cock (KUL/Modinis-IDM) |
| 14:45 |
Break
|
| 15:15 |
Risk Analysis for Privacy in VANETs, M. Gerlach (Fokus/C2C) |
| 16:10 |
Improving Anonymity and Privacy in Wave, Amer Aijaz (VW/C2C) |
| 16:15 |
Discussion on privacy and identity management for C2C |
| 17:00 |
Requirements and Use Case, F. Kargl (Univ. Ulm/Sevecom) |
| 17:30 |
Revocation Protocol using the Tamper Proof Device, M. Raya (EPFL/Sevecom) |
| 18:00 |
Adjourn |
| Tuesday, 27 June 2006 |
| 09:00 |
Intrusion Detection: Introduction, E. Schoch (Univ. Ulm/Sevecom) |
| 09:30 |
Data Consistency: Introduction, L. Csik (BUTE/Sevecom) |
| 10:00 |
Potential Applications of Pairings, L. Csik (BUTE/Sevecom) |
| 10:30 |
Break
|
| 10:45 |
Secure User Interface: Introduction, F. Kargl (Univ. Ulm/Sevecom) |
| 11:15 |
Secure Positioning in VANETs, M. Raya (EPFL/Sevecom) |
| 11:30 |
Digital Rights Management: Introduction, A. Held (DaimlerChrysler/Sevecom) |
| 12:00 |
Lunch |
| 13:00 |
Workshop concluding remarks, A. Kung (Trialog/Sevecom):
|
| 13:30 |
Adjourn |