Keynote Speakers

  • Security and Cooperation in Wireless Networks by
    Professor Jean-Pierre Hubaux, LCA (Laboratory for computer Communications and Applications), EPFL, Switzerland
    Jean-Pierre Hubaux Professor Jean-Pierre Hubaux joined the faculty of EPFL in 1990; he was promoted to full professor in 1996. His research activity is focused on wireless networks, with a special interest in security and cooperation issues.
    He has been strongly involved in the National Competence Center in Research named "Mobile Information and Communication Systems" (NCCR/MICS), since its genesis in 1999; this center is often nicknamed "the Terminodes project". In this framework, he has notably defined, in close collaboration with his students, novel schemes for the security and cooperation in multi-hop wireless networks, vehicular networks, and sensor networks; in particular, he has devised new techniques for key management, secure positioning, and incentives for cooperation in such networks. He has also made several contributions in the areas of power management in sensor networks and of group communication in ad hoc networks.
    He has recently written, with Levente Buttyan, a graduate textbook entitled "Security and Cooperation in Wireless Networks".
    He is an Associate Editor of IEEE Transactions on Mobile Computing and Foundations and Trends in Networking. He served as the general chair for the Third ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), held on the EPFL campus. He has been serving on the program committees of numerous conferences and workshops, including SIGCOMM, Infocom, Mobicom, Mobihoc, SenSys, WiSe, and VANET.
    He has held visiting positions at the IBM T.J. Watson Research Center and at the University of California at Berkeley.
    He was born in Belgium, but spent most of his childhood and youth in Northern Italy. After completing his studies in electrical engineering at Politecnico di Milano, he worked 10 years in France with Alcatel, where he was involved in R&D activities, primarily in the area of switching systems architecture and software. 

  • Identity Theft/Impersonation Attacks by
    Professor Fred Piper
    , ISG (Information Security Group), Royal Holloway University of London, UK
    "Identity theft is undoubtedly one of Information Security's current hot topics.  However, it is certainly not a new concept, as the ability to recognise authorised users has always been a major concern. The term 'identity theft' is also misleading because, if the identifier has some secret knowledge, such as a PIN, password or cryptographic key, then an attacker can impersonate a user without denying the user the capability to identify themself.
    We will look at some of the problems associated with impersonation attacks and look at some of the reasons why trading on the Internet can be so hazardous."
    Fred Piper Professor Fred Piper (BSc PhD(London) CEng CMath FIEE ARCS DIC FIMA) has been a Professor of Mathematics at the University of London since 1975 and has worked in security since 1979. In 1985 he formed a company, Codes & Ciphers Ltd., which offers consultancy advice in all aspects of information security. He has acted as a consultant to over 50 companies including a number of financial institutions and major industrial companies in the UK, Europe and USA. The consultancy work has been varied and has included algorithm design and analysis, work on EFTPOS and ATM networks, data systems, security audits, risk analysis and the formulation of security policies. He has lectured world-wide on information security, both academically and commercially, has published a number of cryptographic papers, and is joint author of Cipher Systems (1982), one of the first books to be published on the subject of protection of communications, Secure Speech Communications (1985) and Cryptography: A very short introduction (2002). He was a member of ITSAG, the DTI's Information Technology Advisory Group from 1989 - 1991. From 1992 to 1995 he was a member of ITSSQC, the advisory committee to DTI on IT Standards, Security and Quality. He is currently a member of the Foresight Crime Prevention Panel: IT, Electronics and Communications Task Force, a member of the DTI Management of Information for Fraud Control, Security and Privacy Link Programme, and a member of the Scientific Council of the Smith Institute. He is a member of the Board of Trustees for Bletchley Park. In 2002 he was awarded an IMA gold medal for "services to mathematics" and received an honorary CISSP for "leadership in Information Security". In 2003 he received an honorary CISM for "globally recognised leadership" and "contribution to the Information Security Profession".

  • The Identity Metasystem and "Laws" of Identity by
    Caspar Bowden, Chief Privacy Advisor EMEA, Microsoft EMEA Technology Office, UK
    Caspar Bowden Caspar Bowden leads the privacy pillar of the Trustworthy Computing initiative across Europe, Middle-East and Africa. His goal is to ensure that users of Microsoft products and services are in control of their personal data and that fair information practices are respected. He is a specialist in data protection policy, privacy enhancing technology research, identity management and authentication. He was formerly director of the Foundation for Information Policy Research, an independent think-tank that studies the interaction between computers and society, and promotes public understanding and dialogue between UK and European civil society and policy-makers in the fields of e-commerce, copyright, law enforcement and national security, e-government, cryptography and digital signatures. He was appointed expert adviser to the UK parliament for the passage of three bills concerning privacy issues, and was co-organizer of the influential Scrambling for Safety public conferences on UK encryption and surveillance policy. His previous career over two decades ranged from investment banking (proprietary trading risk-management for option arbitrage), to software engineering (graphics engines and cryptography), including work for Goldman Sachs, Microsoft Consulting Services, Acorn, Research Machines, and IBM.

  • A Framework for Multi-Level Security in Wireless Sensor Networks by
    Professor Sajal K. Das, Director, Center for Research in Wireless Mobility and Networking, The University of Texas at Arlington
    Sajal K. Das
    Dr. Sajal K. Das is a Distinguished Scholar Professor of Computer Science and Engineering and the Founding Director of the Center for Research in Wireless Mobility and Networking (CReWMaN) at the University of Texas at Arlington (UTA). He is also a Visiting Professor at the Indian Institute of Technology (IIT), Kanpur and IIT Guwahati; Honorary Professor of Fudan University in Shanghai, China; and Visiting Scientist at the Institute of Infocomm Research  (I2R), Singapore. His current research interests include design and modeling of smart environments, sensor networks, security,  mobile and pervasive computing, resource and mobility management in wireless networks, wireless multimedia, mobile Internet, mobile grid computing, biological networking, applied graph theory and game theory. He has published over 400 papers in international conferences and journals, and over 30 invited book chapters. He holds five US patents in wireless mobile networks, and  coauthored the book "Smart Environments: Technology, Protocols, and  Applications" (John Wiley, 2005). Dr. Das received Best Paper Awards in IEEE PerCom'06, ACM MobiCom'99, ICOIN'02, ACM MSwiM'00 and ACM/IEEE  PADS'97. He is also a recipient of UTA Academy of Distinguished Scholars Award (2006), University Award for Distinguished record of Research (2005),  College of Engineering Research Excellence Award (2003), and Outstanding Faculty Research Award in Computer Science (2001 and 2003). He is frequently invited as keynote speaker at international conferences and symposia. He serves as the Founding Editor-in-Chief of Pervasive  and Mobile Computing (PMC) journal (Elsevier), and Associate Editor  of IEEE Transactions on Mobile Computing, ACM/Springer Wireless Networks,  IEEE Transactions on Parallel and Distributed Systems, and Journal of Peer-to-Peer Networking. He is the founder of IEEE WoWMoM and co-founder  of IEEE PerCom conferences. He has served as General or Technical  Program Chair as well as TPC member of numerous IEEE and ACM conferences.  He is a member of IEEE TCCC and TCPP Executive Committees.

  • Enabling Trusted Mobile Applications with the SIM by
    Patrick Waters, Head of Research and Development in the Netherlands for Vodafone Group
    Patrick Waters
    Patrick Waters CEng, MIEE is Head of Research and Development in the Netherlands for Vodafone Group. After graduating in Electronic Engineering at Southampton University in 1982, he started to work on mobile communications research at Roke Manor Research. A major focus of his activity was on system design and implementation of GSM, building on the early experience built up on military radio systems and digital signal processing. This included the development of a first European demonstration of the emerging GSM standard for Vodafone in 1987. After further R&D into terminal and base station products, Patrick joined Vodafone in the UK and subsequently became part of Group R&D. In Vodafone he trialled CDMA radio access technology with a GSM core network and protocols, together with video applications, before the UK licence was won by Vodafone. In recent years he has focused more on technologies that enable richer services, including the use of identity provided by the smartcard. Using the secure execution environment within the mobile phone enables opportunities to run a variety of trusted applications such as contactless transport and payment.