8:00 | - | 8:30 | | -- REGISTRATION AND COFFEE -- |
| | | | |
| | | | |
8:30 | - | 8:35 | | -- INTRODUCTION AND WELCOME -- |
| | | | |
| | | | |
8:35 | - | 10:15 | | - SESSION 1: Post-Quantum Security (Chair: Juliane Krämer) - |
| | | | |
| - | | | Sophia Grundner-Culemann: Automated Proofs for the Post-quantum Extensions of IKEv2 |
| - | | | Kiron Mirdha: Towards Automated Post-Quantum Certificate Management for the Industrial Internet of Things |
| - | | | Monika Trimoska: Disorientation Faults in CSIDH |
| - | | | Erin Hales: HE Noise Analysis (Virtual) |
| | | | |
| | | | |
10:15 | - | 10:30 | | -- COFFEE BREAK -- |
| | | | |
| | | | |
10:30 | - | 12:10 | | - SESSION 2: Privacy and Security Management (Chair: Elif Bilge Kavun) - |
| | | | |
| - | | | Leonie Wolf: Crypto Agility Spider Chart |
| - | | | Shokofeh VahidianSadegh: Homomorphically Biclustering Analysis for Gene Expression Data |
| - | | | Anita Aghaie and Aliza Maftun: An Approach to Achieve Trustworthiness in Industrial Domain |
| - | | | Rucha Bhalchandra Joshi: Privacy in Graphs (Virtual) |
| | | | |
| | | | |
12:10 | - | 13:00 | | -- LUNCH -- |
| | | | |
| | | | |
13:00 | - | 14:00 | | -- KEYNOTE SPEECH 1: Johanna Sepulveda -- |
| | | | |
| | | | |
15:00 | - | 16:00 | | -- Transfer to Pier from Campus for Social Event -- |
| | | | |
| | | | |
15:00 | - | 16:00 | | -- SOCIAL EVENT: Boat Tour (meet at the pier 10 minutes before tour) -- |
| | | | |
| | | | |
16:00 | - | 17:30 | | -- SOCIAL EVENT: City Tour -- |
| | | | |
| | | | |
17:30 | - | 20:30 | | -- SOCIAL DINNER -- |