Information on the SRM seminar is kept here. The SRM is a joint research seminar of the SaToSS and APSIA groups and takes place Tuesdays 10:30-11:30 in E212 on the Kirchberg Campus unless otherwise indicated. It features presentations on ongoing research in security, privacy, and trust. The next upcoming presentation is highlighted in boldface. A google calendar of the SRM and related seminars is available.
No. | Date | Presenter | Title | |
---|---|---|---|---|
115. | December 20 | Hugo Jonker | Mixnet verification by combining RPC and optimistic mixing | |
114. | December 12, 4pm, Room C02 | Simon Kramer | A Logic of Interactive Proofs | Abstract |
113. | December 8, 4pm, Room A02 | Laurent Doyen (CNRS Cachan) | Partial-Observation Stochastic Games: How to Win when Belief Fails [slides] | Abstract |
112. | November 29 | Dalia Khader | Receipt Freeness of Prêt à Voter, Provably Secure | Abstract |
111. | November 22 | Andrzej Mizera (Polish Academy of Sciences) | Methods for construction and analysis of computational models in systems biology [slides] | Abstract |
110. | November 15 | Naipeng Dong | Enforced privacy in the presence of others: notions, definitions and relations | Abstract |
109. | October 18 | Steve Kremer (INRIA Nancy) | Password Protocols, Composition and Transformation [slides] | Abstract |
108. | October 11 | Tim Muller | The mathematics behind trust opinions as estimates of behaviour | Abstract |
107. | October 4 | Xihui Chen | Measuring query privacy in location-based services | Abstract |
106. | September 27, 2pm, Main building C02 | Ton van Deursen | Security of RFID protocols (Ph.D. defense) | |
105. | September 20 | No talk. | Everyone's at hack.lu. | |
104. | September 13 | Ludovic Pietre-Cambacedes (EDF R&D) | Beyond classical attack trees: attack and defense modeling with BDMP [slides] | Abstract |
103. | September 6 | Frédéric Prost (UFR IMAG, Université Joseph Fourier) | Enforcing Dynamic Interference Policy [slides] | Abstract |
102. | July 26 | Patrick Schweitzer | Attributes on Attack-Defense Trees | Abstract |
101. | July 21 | Jeroen van der Graaf (Universidade Federal de Minas Gerais, Brazil) | Authentication and key establishment for smart phones using correlated data | Abstract |
100. | July 19 | Qian Li, David Kamdoum | M.Sc. midterm presentations | Abstracts |
99. | July 14 | Loïc Paulevé (IRCCyN/École Centrale de Nantes, France) | Modelling, Simulation and Model-Checking of Large Biological Regulatory Networks [slides] | Abstract |
98. | July 12 | Cheng Xing, Yiwen Meng | M.Sc. midterm presentations | Abstracts |
97. | July 8 | Josh Benaloh (Microsoft Research) | Verifiable Election Technologies - How Elections Should Be Run [pdf slides] [pptx slides] | Abstract |
96. | July 5 | Jürg Kohlas (University of Fribourg) | An Algebraic Theory of Information | Abstract |
95. | June 21 | Jean-Paul Weber, Qixia Yuan | M.Sc. midterm presentations | Abstracts |
94. | June 17, 13:30 | Luca Viganò (Università di Verona) | On some composition problems in the formal analysis of service-oriented architectures | Abstract |
93. | May 26 | Kristian Gjøsteen (NTNU Norway) | Internet voting in Norway 2011 [slides] | Abstract |
92. | May 17 | Simon Kramer | A general definition of malware [slides] | Abstract |
91. | April 27 | Anders Lund (NTNU Norway) | Improving the performance of the Norwegian Internet voting protocol | Abstract |
90. | April 19 | Tim Muller | Equational theory of subjective logic | |
89. | April 5 | Naipeng Dong | An Introduction to the Applied Pi Calculus - Part II | Abstract |
88. | March 29 | Xihui Chen | Hiding in Groups: Anonymity-Preserving Electronic Toll Pricing | Abstract |
87. | March 24 | Hongyang Qu (University of Oxford) | Assume-guarantee verification for probabilistic systems | Abstract |
86. | March 17 | Steve Schneider (University of Surrey) | Write-ins for Prêt a Voter | Abstract |
85. | March 15 | Matthijs Melissen | Verification of non-repudiation protocols | Abstract |
84. | March 1 | Peter Ryan | Prêt a Voter with Acknowledgement Codes | Abstract |
83. | February 22 | Marc Pouly | Information Theory for Imprecise Probabilities | Abstract |
82. | February 15 | Wojtek Jamroga | Comparing Variants of Strategic Ability | Abstract |
81. | February 8 | Sasa Radomirovic | On Sequences Containing All Permutations of a Set as Subsequences | Abstract |
80. | January 25 | Mark Ryan (University of Birmingham) | Cloud computing and data confidentiality | |
79. | January 11 | Hugo Jonker | Fairness in Voting | Abstract |