Flyer: AuthIOT Programme and Work-Stream Members information (PDF)

Speaker Presentations
Speaker Title Download
Emeritus Professor,
Department of Mathematics and Statistics,
University of Calgary, Alberta, Canada
The Role of Number Theory in Authentication: An Overview (Keynote) PDF File
Director of the Computer Security and Industrial Cryptography group (COSIC),
KULeuven, Leuven, Belgium
Technology and Regulatory Challenges for the IoT (Keynote) PDF File
Mr. Matt Tett
Managing Director of Enex TestLab,
274 Victoria Street Brunswick Victoria, and
Chair WS5
Cyber Security & Network Resilience IoT Alliance Australia
Why authentication is critical to security in an IoT world PDF File
Professor Margreta Kuijper
Department of Electrical and Electronic Engineering,
Melbourne University
Resilient linear systems under attack PDF File
Dr. Ray Hunt
University of Canterbury,
New Zealand
Practical Experience with IoT INSecurity - A Hands-on IoT Workshop PDF File
Dr. Damith Ranasinghe
Director, AutoID Lab,
School of Computer Science,
University of Adelaide, Australia
Can Physical Unclonable Functions be used to realize lightweight dynamic authentication for IoT devices?  
Dr. Jürg von Kaenel
Senior Manager,
IBM Research – Australia Lab,
I really don't want to manage my IoT devices PDF File
Professor Lejla Batina
Institute of Computer and Information Sciences,
Radboud University,
Nijmegen, The Netherlands
Side-channel attacks on IoT devices PDF File
Professor Seng Loke
School of Information Technology,
Deakin University, Australia
Cooperative IoT: a Trust Challenge PDF File