All times are in Central European Summer Time (CEST).
The program is tentative and may be subject to changes.
| Monday, April 20, 2026 | |
| Lunch | 13:00-14:00 |
|
Registration |
13:30-14:30 |
|
Introductory Remarks Marco Pernpruner, Giada Sciarretta (Program Co-Chairs) |
14:30-14:45 |
|
Session 1: Security and Trust in the EUDI Wallet Ecosystem |
|
|
From NIS2 to the EUDI Wallet: Path Dependence in EU Digital Identity Security and Assurance Giorgio Pedrazzi (University of Brescia) |
14:45-15:10 |
|
Trust at European and National Level: Technologies and Approaches in the Italian EUDI Wallet Architecture with OpenID Federation 1.0 and eIDAS Trusted Lists Giuseppe De Marco (Dipartimento per la Trasformazione Digitale) |
15:10-15:35 |
|
EUDIW Threats That Have Not Been Identified: Users Collusion Attacks Denis Pinkas (DP Security Consulting SAS) |
15:35-16:00 |
| Coffee Break | 16:00-16:45 |
|
Session 2: Round Table |
|
|
Under Definition (focused on Business Wallet) |
16:45-18:15 |
|
First Day Take-Aways |
18:15-18:30 |
|
Welcome Reception |
18:30-21:00 |
| Tuesday, April 21, 2026 | |
|
Registration |
8:45-9:15 |
|
Second Day Opening Marco Pernpruner, Giada Sciarretta (Program Co-Chairs) |
9:15-9:30 |
|
Session 3: Cryptographic Resilience |
|
|
The Post-Quantum Apocalypse Is Already Upon Us Michael Jones (Self-Issued Consulting) |
9:30-9:55 |
|
Software-Assisted Analysis of Post-Quantum Cryptography Migration for the European Digital Identity Wallet Salvatore Migliaccio, Paolo Campegiani, Giulio Di Clemente (Namirial S.p.A.) |
9:55-10:20 |
|
MIFARE DESFire in Practice: A Systematization of Attacks and Deployment Weaknesses Tomáš Přeučil, Martin Novotný (Czech Technical University), David Oswald (Durham University) |
10:20-10:45 |
| Coffee Break | 10:45-11:30 |
|
Session 4: Identity Protocol Evolution |
|
|
The Journey to OpenID Federation 1.0 and the Road Ahead Michael Jones (Self-Issued Consulting), Giuseppe De Marco (Dipartimento per la Trasformazione Digitale), Roland Hedberg (Independent) |
11:30-11:55 |
|
Evolution of Remote Attestation: A Systematic Literature Review of Post-2020 Approaches Florian Wegscheider, Tobias Hilbig, Thomas Schreck (Munich University of Applied Sciences) |
11:55-12:20 |
|
The Identity Mismodeling Crisis: Rectifying B2C and Workforce IAM Misuse in B2B Ecosystems Anuradha Karunarathna (WSO2) |
12:20-12:45 |
| Lunch | 12:45-14:15 |
|
Session 5: Identity in the Age of AI and Privacy |
|
|
So Many Anonymous Credentials, So Little Adoption: Can We Break the Linkability Loop in Identity Management? Andrea Moro (Fondazione Bruno Kessler) |
14:15-14:40 |
|
Designing Identity and Access Management for AI Agents Thivaharan Kalyanasundaram (WSO2) |
14:40-15:05 |
|
Provenance Identity Continuity (PIC): Secure Authority Propagation from Human and Non-Human Origins Across Trust Boundaries Nicola Gallo, Antonio Radesca (Nitro Agility Srl) |
15:05-15:30 |
| Coffee Break | 15:30-16:15 |
|
Session 6: Under Definition |
|
|
Under Definition |
16:15-16:40 |
|
Under Definition |
16:40-17:05 |
|
Closing Remarks Silvio Ranise (General Chair) |
17:05-17:30 |