Information on the SaToSS Research Meeting seminar is kept here. The SaToSS Research Meeting takes place Tuesdays 10:30-11:30 in E212 on the Kirchberg Campus unless otherwise indicated.
| No. | Date | Presenter | Title | |
|---|---|---|---|---|
| 34. | December 15 | Gabriele Lenzini | Trust-Enhanced Security: Applying Trust Management in Systems' Security, Examples | Abstract |
| 33. | December 1 | Sjouke Mauw | Secret Santa Protocols | Abstract |
| 32. | November 17 | Patrick Schweitzer | On Attack/Defense Trees [slides] | Abstract |
| 31. | November 10 | Robert Carter | Location-aware multifactor authentication | Abstract |
| 30. | November 3 | Barbara Kordy | Verifying Security Protocols using Term Rewriting Techniques | Abstract |
| 29. | October 27 | Graham Steel | Formal Analysis of Security APIs [slides] | Abstract |
| 28. | October 20 | Jun Pang | Probabilistic leader election algorithms | Abstract |
| 27. | October 9 | Xin An | Model Checking Round-Based Distributed Algorithms | Abstract |
| 26. | October 6 | Xihui Chen | Improving automatic verification of security protocols with XOR | Abstract |
| 25. | September 29 | Ying Zhang | Game-Based Verification of Multi-Party Contract Signing Protocols | Abstract |
| 24. | September 17 | Tim Muller | The Expressivity of Kleene star in Process Algebras with the Empty Process | Abstract |
| 23. | September 15 | Peter Ryan | Pretty Good Democracy | Abstract |
| 22. | September 9 | Ben Smyth, University of Birmingham | Automated reasoning for election verifiability in electronic voting protocol | Abstract |
| 21. | July 21 | Delphine Longuet | Testing from Logical Specifications: Proof-guided Test Selection | Abstract |
| 20. | July 20 | Patrick Schweitzer | Accelerating Average Consensus - Weight Choosing with the Symprio Algorithm | Abstract |
| 19. | July 14 | Pim Vullers | Secure Ownership and Ownership Transfer in RFID Systems | Abstract |
| 18. | June 30 | Sjouke Mauw | Petri net basics plus a specification of the coin exchange problem | Abstract |
| 17. | June 16 | Sasa Radomirovic | On Coin Exchanges and Wallets | Abstract |
| 16. | June 4 | Osman Akcatepe | Polarization Mode Dispersion and Chromatic Dispersion in Quantum Cryptography | Abstract |
| 15. | May 28, 13:00 | Hongyang Qu | MCMAS: A model checker for the verification of multi-agent systems | Abstract |
| 14. | May 26 | Peter Ryan | OpenVeto and OpenVote | Abstract |
| 13. | May 19 | Baptiste Alcalde | Model-driven Fuzzing | Abstract |
| 12. | May 12 | Sasa Radomirovic | More on honest but curious judges | Abstract |
| 11. | May 5 | Chenyi Zhang | How to Work with Honest but Curious Judges? | Abstract |
| 10. | April 28, 14:00 | Hugo Jonker | Nuovo DRM: Introducing Fair Exchange in DRM [slides] | Abstract |
| 9. | April 21 | Erik de Vink | Architecting Security with Paradigm | Abstract |
| 8. | April 8 | Xihui Chen, Xin An, Ying Zhang | Midterm presentation of Master's thesis work | Abstract |
| 7. | March 31 | Ton van Deursen | Undecidability | Abstract |
| 6. | March 24 | Barbara Kordy | A Rewrite Approach for Tree Pattern Containment | Abstract |
| 5. | March 17, 15:30 | Gerardo Iglesias, Pim Vullers | Midterm presentation of Master's thesis work | Abstract |
| 4. | March 10 | Peter Ryan | Prêt a Voter a la Florentina | Abstract |
| 3. | March 3 | Chenyi Zhang | Information Flow in Systems with Schedulers | Abstract |
| 2. | February 24 | Mohammad Torabi Dashti | Super-strings and multi-party contract signing | Abstract |
| 1. | February 17 | Sjouke Mauw | An algebra for trust dilution and trust fusion | Abstract |