4th International Workshop on Trends in Digital Identity (TDI 2026)

Program

All times are in Central European Summer Time (CEST).

The program is tentative and may be subject to changes.

Monday, April 20, 2026
Lunch 13:00-14:00

Registration

13:30-14:30

Introductory Remarks

Marco Pernpruner, Giada Sciarretta (Program Co-Chairs)

14:30-14:45

Session 1: Security and Trust in the EUDI Wallet Ecosystem

From NIS2 to the EUDI Wallet: Path Dependence in EU Digital Identity Security and Assurance

Giorgio Pedrazzi (University of Brescia)

14:45-15:10

Trust at European and National Level: Technologies and Approaches in the Italian EUDI Wallet Architecture with OpenID Federation 1.0 and eIDAS Trusted Lists

Giuseppe De Marco (Dipartimento per la Trasformazione Digitale)

15:10-15:35

EUDIW Threats That Have Not Been Identified: Users Collusion Attacks

Denis Pinkas (DP Security Consulting SAS)

15:35-16:00
Coffee Break 16:00-16:45

Session 2: Round Table

Under Definition (focused on Business Wallet)

16:45-18:15

First Day Take-Aways

18:15-18:30

Welcome Reception

18:30-21:00
Tuesday, April 21, 2026

Registration

8:45-9:15

Second Day Opening

Marco Pernpruner, Giada Sciarretta (Program Co-Chairs)

9:15-9:30

Session 3: Cryptographic Resilience

The Post-Quantum Apocalypse Is Already Upon Us

Michael Jones (Self-Issued Consulting)

9:30-9:55

Software-Assisted Analysis of Post-Quantum Cryptography Migration for the European Digital Identity Wallet

Salvatore Migliaccio, Paolo Campegiani, Giulio Di Clemente (Namirial S.p.A.)

9:55-10:20

MIFARE DESFire in Practice: A Systematization of Attacks and Deployment Weaknesses

Tomáš Přeučil, Martin Novotný (Czech Technical University), David Oswald (Durham University)

10:20-10:45
Coffee Break 10:45-11:30

Session 4: Identity Protocol Evolution

The Journey to OpenID Federation 1.0 and the Road Ahead

Michael Jones (Self-Issued Consulting), Giuseppe De Marco (Dipartimento per la Trasformazione Digitale), Roland Hedberg (Independent)

11:30-11:55

Evolution of Remote Attestation: A Systematic Literature Review of Post-2020 Approaches

Florian Wegscheider, Tobias Hilbig, Thomas Schreck (Munich University of Applied Sciences)

11:55-12:20

The Identity Mismodeling Crisis: Rectifying B2C and Workforce IAM Misuse in B2B Ecosystems

Anuradha Karunarathna (WSO2)

12:20-12:45
Lunch 12:45-14:15

Session 5: Identity in the Age of AI and Privacy

So Many Anonymous Credentials, So Little Adoption: Can We Break the Linkability Loop in Identity Management?

Andrea Moro (Fondazione Bruno Kessler)

14:15-14:40

Designing Identity and Access Management for AI Agents

Thivaharan Kalyanasundaram (WSO2)

14:40-15:05

Provenance Identity Continuity (PIC): Secure Authority Propagation from Human and Non-Human Origins Across Trust Boundaries

Nicola Gallo, Antonio Radesca (Nitro Agility Srl)

15:05-15:30
Coffee Break 15:30-16:15

Session 6: Under Definition

Under Definition

16:15-16:40

Under Definition

16:40-17:05

Closing Remarks

Silvio Ranise (General Chair)

17:05-17:30