The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in E212 on the Kirchberg Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.
Since 2012, the SRM is co-organised by Barbara Kordy and Jean Lancrenon. From 2009-2011, the SRM was organised by Saša Radomirović. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.
No. | Date | Presenter | Title | Abstracts |
---|---|---|---|---|
198. | December 17 | Samir Ouchani | A Security Verification Framework for SysML Activity Diagrams | Abstract |
197. | December 10, F213 | Jeroen van de Graaf (Universidade Federal de Minas Gerais, Brasil) | Improved Non-Interactive Dining Cryptographers | Abstract |
196. | Friday, November 22, 10am, joint SRM and CSC-Bio seminar, Salle du Conseil | Jean Krivine | Rule-based modeling of protein-protein interaction networks: deriving pathways from facts. | Abstract |
195. | November 19, F213 | Vincenzo Iovino (University of Warsaw, Poland) | On the achievability of simulation-based security for functional encryption | Abstract |
194. | November 12 | Gabriele Lenzini | Applying the Socio-Technical Approach in Security | Abstract |
193. | October 29 | Diana Marosin (CRP Henri Tudor) | Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach | Abstract |
192. | Wednesday, October 16, 3:30pm, F213 | Liqun Chen (HP labs) | Trusted Computing: Trusted Platform Modules and the Cryptographic Algorithms Supported by Them | Abstract |
191. | October 15 | Steve Kremer (LORIA Nancy) | Automated verification of equivalence properties in symbolic models [slides] | Abstract |
190. | October 1st, F213 | Jose Miguel Perez Urquidi | Attribute Based Signatures | Abstract |
189. | Thursday, September 26, 10am, E212 | Christian W. Probst (Technical University of Denmark) | From System Models to Attack Trees | Abstract |
188. | September 24, F213 | Stephen Clark (University of Cambridge) | Linguistic Steganography: Information Hiding in Text | Abstract |
187. | July 23, 2pm, F213 | Jeroen van de Graaf (Universidade Federal de Minas Gerais, Brazil) | Fast key distribution with security from quantum-optical noise | Abstract |
186. | July 9, F213 | Philip B. Stark (University of California, Berkeley) | Mini-Minimax Uncertainty of Emulators | Abstract |
185. | July 2 | Sjouke Mauw | Fair Parallel Multi-party Contract Signing Protocols | Abstract |
184. | Thursday, June 20, 10:30am, F213 | Walter Belgers (Madison Gurkha, Eindhoven) | Social Engineering | Abstract |
183. | June 18 | Xihui Chen | A Trust Framework for Evaluating GNSS Signal Integrity | Abstract |
182. | June 11 | Barbara Kordy | Probabilistic framework for attack-defense trees | Abstract |
181. | June 4, F213 | Rui Joaquim | Voter Verifiable Complex Ballots Encryption | Abstract |
180. | May 28, 2pm, F213 | Michele Orru (Trustwave SpiderLabs) | I got your browser: say hello to BeEF [slides] | Abstract |
179. | Wednesday, May 22, 1:30pm | Tim Muller | Beta Models with Trust Chains | Abstract |
178. | May 14 | Li Li (National University of Singapore) | Symbolic Analysis of an Electric Vehicle Charging Protocol | Abstract |
177. | May 7 | Joost-Pieter Katoen (RWTH Aachen University) | Analyzing Probabilistic Programs: Pushing the Limits of Automation | Abstract |
176. | April 30 | Yang Zhang | A New Access Control Scheme for Facebook-style Social Networks | Abstract |
175. | April 23, F213 | Jean Lancrenon | Three-Party, Password-Authenticated Key Exchange with Server Private Keys | Abstract |
174. | Friday, April 19, 2pm | Marielle Stoelinga (University of Twente) | Time-Dependent Analysis of Attacks | Abstract |
173. | March 26 | David Williams (Vrije Universiteit Amsterdam) | Model Checking under Refinement Closed Notions of Fairness [slides] | Abstract |
172. | Joint SRM/Ilias seminar Friday, March 15, 10:30am | Mirosław Kurkowski (Czestochowa University of Technology, Poland) | Fast Verification of Security Protocols | Abstract |
171. | March 12 | Gerben Broenink (TNO The Netherlands) | Security in smart grids [slides] | Abstract |
170. | March 5 | Christian Franck | Anonymous communication and e-voting based on the Dining Cryptographers protocol | Abstract |
169. | Friday, March 1st, 10am, F213 | Paulo Verissimo (Universidade de Lisboa) | Beyond the glamour of Byzantine Fault Tolerance: OR why resisting intrusions means more than BFT | Abstract |
168. | February 26 | Jannik Dreier (VERIMAG, France) | Verifiability in e-Auction Protocols & Brandt's Protocol Revisited | Abstract |
167. | January 22, F213 | Joel Ouaknine (Oxford University) | Decision Problems for Discrete Linear Dynamical Systems | Abstract |
166. | Friday, January 18, 10:30am, E212 | Muhammed Ali Bingol (TUBITAK-BILGEM UEKAE, Turkey) | RFID security and privacy protocols for practical usage | Abstract |