1) administrivia/wg reports (10 mins) 2a) Time Synch Protocol Security - Intro and Requirements, Karen O'Donoghue (5 minutes) RFC 7384 2b) Network Time Security, Kristof Teichel (15 minutes) http://www.ietf.org/id/draft-ietf-ntp-network-time-security-05.txt http://www.ietf.org/id/draft-ietf-ntp-cms-for-nts-message-00.txt 3) Router backdoor threat model analysis (Ning Zong, 10 minutes) http://www.ietf.org/id/draft-song-router-backdoor-00.txt 4) Research protocol considerations for human rights, Niels ten Oever & Joana Varon (10 minutes) http://www.ietf.org/id/draft-doria-hrpc-proposal-00.txt 5) A Survey of Worldwide Censorship Techniques, Joseph Hall (20 minutes) http://www.ietf.org/id/draft-hall-censorship-tech-00.txt 6) POODLE, Richard Barnes (10 minutes) 7) open-mic (30 mins)