10:00 - 10:15 | Welcome / Introduction
|
10:15 - 11:00 | A Recently Proposed Class of Protocols
[ps,
advi]
Joshua Guttman (MITRE) |
11:00 - 11:45 | Statistics and Skeletons
[ps]
Javier Thayer (MITRE) |
11:45 - 1:00 | Lunch
|
1:00 - 1:45 | A Protocol Logic
[pdf]
Gerard Allwein (NRL) |
1:45 - 2:30 | Relating the MSR Cryto-Protocol Specification Language to Rewrite Logic
with Dependent Types
[ppt]
Mark-Oliver Stehr (Urbana-Champaign) |
2:30 - 2:45 | Break
|
2:45 - 3:15 | Formulating the Strand Space Authenication Tests in Maude
Sylvan Pinsky (NSA), Ed Zieglar (UMBC) |
3:15 - 4:00 | Shared Channels
[ppt]
Carl Gunter (UPenn) |
4:00 - 4:15 | Break
|
4:15 - 5:00 | Type Confusion
[pdf]
Cathy Meadows (NRL) |
10:00 - 10:45 | Kerberos Proof Techniques
[ppt]
Aaron Jaggard (UPenn) |
10:45 - 11:45 | Metrics for Traffic Analysis Protection
[html]
/ The Paradoxic Value of Privacy
Paul Syverson (NRL) |
11:45 - 1:00 | Lunch
|
1:00 - 1:45 | Towards Taxonomy of Challenge-Response Protocols
Dusko Pavlovic (Kestrel) |
1:45 - 3:30 | Logic for Proving Properties of Protocols
[ppt]
John Mitchell (Stanford) |
2:30 - 2:45 | Break
|
2:45 - 3:30 | Advantage and Abuse-freeness in Contract Signing Protocols
[ppt]
Rohit Chadha (UPenn) |
3:30 - 4:15 | Game Analysis of Contract-Signing Protocols
[pdf]
Steve Kremer (Brussels) |
4:15 - 5:00 | Relating Process Algebras and Multiset Rewriting for Security Protocol
Analysis
[ppt]
Iliano Cervesato (ITT) |