In order to enable an iCal export link, your account needs to have an API key created. This key enables other applications to access data from within Indico even when you are neither using nor logged into the Indico system yourself with the link provided. Once created, you can manage your key at any time by going to 'My Profile' and looking under the tab entitled 'HTTP API'. Further information about HTTP API keys can be found in the Indico documentation.
Additionally to having an API key associated with your account, exporting private event information requires the usage of a persistent signature. This enables API URLs which do not expire after a few minutes so while the setting is active, anyone in possession of the link provided can access the information. Due to this, it is extremely important that you keep these links private and for your use only. If you think someone else may have acquired access to a link using this key in the future, you must immediately create a new key pair on the 'My Profile' page under the 'HTTP API' and update the iCalendar links afterwards.
Permanent link for public information only:
Permanent link for all public and protected information:
How to enable lightweight secure bootstrap and message attestation in the Internet of Things?
Internet of Things (IoT) offers new opportunities for business, technology and science into an highly connected world, but inherent characteristics of IoT made of numerous resource-constrained devices from various origins, also raises new challenges in terms of security and privacy.
This talk focuses on solving the problem of trust establishment for IoT by proposing a security solution that consists of a secure bootstrap mechanism for device identification as well as a message attestation mechanism for aggregate response validation.
To achieve security and privacy requirements, the problem is approached in a confined environment, named SubNets of Things (SNoT), where multiple devices depend on it. In this context, devices are uniquely and securely identified thanks to their environment and their role within it. Additionally, the underlying message authentication technique features signature aggregation and hence, generates one compact response on behalf of all devices in the subnet.