The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in E212 on the Kirchberg Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.
Currently, the SRM is co-organised by Barbara Kordy and Jean Lancrenon. From 2009-2011, the SRM was organised by Saša Radomirović. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.
No. | Date | Presenter | Title | |
---|---|---|---|---|
165. | December 18, 2pm, joint SRM and SnT seminar | Jason Crampton (Royal Holloway University of London) | On the Parameterized Complexity of the Workflow Satisfiability Problem | Abstract |
164. | December 18 | Luca Viganò (Università degli Studi di Verona) | Formal Methods for the Security of the Internet of Services | Abstract |
163. | December 11 | Jeff Yan (Newcastle University, UK) | The design of image recognition CAPTCHAs: challenges and solutions | Abstract |
162. | December 4, joint SRM and SnT seminar | Alexandre Dulaunoy (CIRCL/SMILE) | The Attackers' Principles [slides] | Abstract |
161. | November 27 | Hongyang Qu (University of Oxford) | Incremental Quantitative Verification for Markov Decision Processes | Abstract |
160. | Friday, November 16, 10:30am, E212 | Devrim Ünal (TUBITAK-BILGEM UEKAE, Turkey) | The Formal Policy Framework for Mobility: Formal Specification, Verification and Enforcement of Location and Mobility Related Security Policies | Abstract |
159. | Wednesday, November 14, 2pm, E212 | Sasa Radomirovic (ETH, Zurich) | Constructing Short Sequences Containing All Permutations of a Set as Subsequences | Abstract |
158. | November 13 | Tejeddine Mouelhi | PPTree: An Attack-Defense Tree Driven Creation of Protection Profile | Abstract |
157. | Thursday, November 8, 3pm, F213, joint SRM and SnT seminar | Florian Kerschbaum (SAP Research, Karlsruhe, Germany) | An Optimizing Compiler for Secure Computations | Abstract |
156. | October 30 | Andreas Albers (Goethe University Frankfurt) | Towards Privacy as a Competitive Edge for Online Business | Abstract |
André Deuker (Goethe University Frankfurt) | All Friends Are Equal - Some Even More: An Investigation of Privacy Protection Among Facebook Users | Abstract | ||
155. | Monday, October 29, 10:30am, E212 | Rolando Trujillo Rasúa (Universitat Rovira i Virgili, Tarragona) | Privacy-preserving publication of spatio-temporal data | Abstract |
154. | October 23, joint SRM and SnT seminar | James Heather (University of Surrey) | Cryptography with Everyday Objects [slides] | Abstract |
153. | October 16, F213 | Vaishnavi Rajendran | Attribute Based Searching of Encrypted Data | Abstract |
152. | October 9, 5:30pm, A02 | Josep Domingo-Ferrer (Universitat Rovira i Virgili, Catalunya) | Co-utility: rational self-enforcement of privacy, security and functionality | Abstract |
151. | October 2 | Michèle Feltz (ETH, Zurich) | Beyond eCK: Security against Stronger Adversaries [slides] | Abstract |
150. | September 25 | Tim Muller | Composite Trust; a formal derivation of conjunction and disjunction of trust opinions | Abstract |
149. | September 18 | Assaad Moawad | Social dimension in security systems | Abstract |
148. | August 7 | Naipeng Dong | Formal Analysis of Privacy in an eHealth Protocol | Abstract |
147. | July 31 | Cas Cremers (ETH, Zurich) | Distance Hijacking attacks on Distance Bounding Protocols | Abstract |
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties | Abstract | |||
146. | Monday, July 23, 10:30am, F213, joint SRM and SnT seminar | Rui Joaquim (Instituto Superior de Engenharia de Lisboa) | A highly sound and efficient voter verifiable vote encryption technique (MarkPledge 3) and its use in the EVIV Internet voting system | Abstract |
145. | Wednesday, July 18, 2:45pm, E212, joint SRM and SnT seminar | Weili Fu (Free University of Bolzano and Technical University of Dresden) | Labeling Extensions of General Tableaux with Many Truth Values | Abstract |
144. | Wednesday, July 18, 2pm, E212, joint SRM and SnT seminar | Iuliia Tkachenko (University Bordeaux 1) | Universal Steganalysis without source-cover mismatch | Abstract |
143. | July 17 | Xihui Chen | Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems | Abstract |
142. | July 10 | Patrick Schweitzer | Specifying quantitative questions on attack-defense trees [slides] | Abstract |
141. | July 3 | Jason Crampton (Royal Holloway, University of London) | Cryptographic enforcement of interval-based access control policies [slides] | Abstract |
140. | Monday, July 2, 2pm, F213, joint SRM and SnT seminar | Christoph Bösch (University of Twente) | Selective Document Retrieval from Encrypted Database | Abstract |
139. | Wednesday, June 27, 2pm, F213, joint SRM and SnT seminar | Selwyn Piramuthu (University of Florida) | PUF-based Authentication Protocol to Address Ticket-Switching of RFID-tagged Items | Abstract |
138. | June 26 | Ran Xue | User Mobility Profiles and Their Usage in Location-Based Services (M.Sc. midterm presentation) | Abstract |
137. | June 19 | Barbara Kordy | On optimistic multi-party contract signing protocols | Abstract |
136. | June 12 | Yang Liu (National University of Singapore) | Pervasive Model Checking | Abstract |
135. | Monday, June 11, 11am, F213, joint SRM and SnT seminar | Zhenchang Xing (National University of Singapore) | Feature Location: How it is and How it Should be Supported | Abstract |
134. | June 5 | Harm van Beek (Netherlands Forensic Institute) | Digital Forensics, what's that about? | Abstract |
133. | Wednesday, May 30, 10:30am, F213, joint SRM and SnT seminar | Dominique Cansell | Formal and Incremental Construction of the Distributed Reference Counting Algorithm | Abstract |
132. | May 22 | Jan Willemson (Cybernetica, Estonia) | Internet voting in Estonia - risk analysis and vote verification [slides] | Abstract |
131. | May 15 | Denise Demirel (TU Darmstadt) | A publicly-verifiable mix-net with everlasting privacy towards observers | Abstract |
130. | May 8 | Matthijs Melissen | Virtual Multi-Protocol Attacks in Non-Repudiation Protocols | Abstract |
129. | Wednesday, April 25, 4pm, A02, joint SRM and Computational Biology talk | Olivier Roux (École Centrale de Nantes) | Hybrid Modelling of biological systems for the accurate analysis of their timing features [slides] | Abstract |
128. | April 24 | Mohammad Hassan Habibi (ISSL Lab, EE Department, Sharif University of Technology) | RFID Systems: Introduction, Authentication, and Privacy Issues | Abstract |
127. | April 17 | Alexandre Bartel | About ByteCode Static Analysis and Manipulation for Android Security | Abstract |
127. | Thursday, April 12, 10:30am, E212 | Stephan Neumann (TU Darmstadt) | Civitas and the Real World: Problems and Solutions from a Practical Point of View | Abstract |
126. | April 3 | Kostas Chatzikokolakis (LIX, École Polytechnique & INRIA Saclay) | Differential Privacy vs Quantitative Information Flow [slides] | Abstract |
125. | Thursday, March 29, 10:30am, F213, joint SRM and SnT seminar | Andrea Huszti (University of Debrecen, Hungary) | Secure Electronic Applications | Abstract |
124. | March 27 | André van Cleeff (University of Twente) | Physical and Digital Security: Comparison, Combinations & Properties | Abstract |
123. | March 13 | Jean Lancrenon | Password-Authenticated Key Exchange | Abstract |
122. | Monday, March 5, 4pm, joint SRM and ICR seminar | Wojciech Jamroga | Castelfranchi's View on Trust | Abstract |
121. | February 28 | Pim Vullers (Radboud University Nijmegen) | Attribute-based Credentials on Smart Cards [slides] | Abstract |
120. | February 23 | Jérôme Dossogne (Université Libre de Bruxelles) | Linking coercion-freeness and verifiability in Internet Voting schemes | Abstract |
119. | February 9, joint SRM and SnT seminar | Rosario Giustolisi (University of Catania) | WATA4.0: Enhancing WATA anonymous marking system with usability and individual verifiability | Abstract |
118. | January 31 | MohammadReza Mousavi (Eindhoven University of Technology) | In Processes, We Believe! -- On Marrying Process Algebra and Epistemic Logic | Abstract |
117. | January 17 | Daniel Marnach, Bianca Miniberger | MSc midterm presentations | |
116. | January 10 | Evangelos Rekleitis (University of the Aegean) | Beyond Single RFID Authentication Protocols: Anonymous and Forward Secure Grouping Proof Protocols | Abstract |