6:00 - 7:00 |
Dinner |
9:00 - 10:30 |
Computational Analysis of Security Protocols Identity Based Authenticated Key Agreement Protocols from Pairings The Diffie-Hellman Key-Agreement Scheme in the Strand Space Model A Computational Analysis of the Needham-Schroeder-(Lowe) Protocol Bogdan Warinschi (University of California at San
Diego) |
10:30 - 10:45 |
Break |
10:45 - 11:45 |
Panel 2: A Tribute to Professor Roger Needham
|
11:45 - 12:00 |
Closing remarks. Presentation of awards |
12:00 |
Lunch |