The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in MNO-E03-03-450 on the Belval Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.
If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Peter Rønne or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.
|300||May 22, 11:00||Stanislav Dashevskyi (University of Trento)||Security Assessment of Third-party Open Source Applications||Abstract|
|299||May 2||Chenyi Zhang (JiNan University)||Unifying Access Control and Information Flow||Abstract|
|298||March 31, 10:30||Cheng-Te Li (National Cheng Kung University)||Planning and Predicting Activities on Location-based Social Networks||Abstract|
|297||March 29, 10:30, JFK Building, Room E004/E005||Richard Clayton (University of Cambridge)||Brute Force Basics||Abstract|
|296||March 23, MNO-E03-03-450||Hongyang Qu (University of Sheffield)||A stochastically verifiable autonomous control architecture with reasoning||Abstract|
|295||March 13, 10:30, F213||Gergei Bana||Computationally Sound Security Analysis with First Order Logic – Computationally Complete Symbolic Attacker Based on Indistinguishability||Abstract|
|294||March 6, 10:30, E212||Yury Zhauniarovich (Qatar Computing Research Institute)||Small Changes, Big Changes: An Updated View on the Android Permission System||Abstract|
|293||March 1, 13:00, E212||Matthijs Melissen (Computest)||An Ethical Hacker's Diary||Abstract|
|292||March 1, 10:30, F213||Wojtek Jamroga (Institute of Computer Science, Polish Academy of Sciences)||Towards Model Checking of Coercion Resistance in Logics of Strategic Ability||Abstract|
|291||Febuary 14||Hauke Busch (University of Lübeck)||Boolean Modeling Reveals the Necessity of Transcriptional Regulation for Cellular Decisions||Abstract|
|290||January 31, 10:30, F213||Zhe Liu (University of Waterloo, Canada)||microFourQ: FourQ Crypto on 8/16/32-bit Embedded Devices||Abstract|
|289||January 27, 10:30, F213||Vincenzo Iovino (University of Luxembourg)||Unconditional and Efficient NIZK proofs in the Random Oracle Model||Abstract|
|288||January 20, 14:00, F213||Johannes Müller (University of Trier, Germany)||sElect: A Lightweight Verifiable Remote Voting System||Abstract|
|287||January 17, 15:30, E212||David Naccache (ENS, Paris)||Testing With Given a priori Probabilities||TBA|