SRM seminar

The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in E212 on the Kirchberg Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.

If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Jean Lancrenon or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.

Presentations

No. Date Presenter Title Abstracts
233. December 16 Federica Paci (University of Trento) How do you know that a security risk assessment method work? An empirical approach Abstract
232. December 9, F213 Vincenzo Iovino Simulation-based secure functional encryption in the random oracle model Abstract
231. December 2 Anton Wijs (Eindhoven University of Technology) GPU-Based Graph Decomposition into Strongly Connected and Maximal End Components Abstract
230. November 25 Andrzej Mizera Probabilistic Boolean Networks: a modelling framework for large biological systems Abstract
229. Thursday, November 20, F213 Mark Manulis (University of Surrey) Cryptographic Password Authentication with TLS Channel Bindings Abstract
228. Tuesday, November 11 Marcello Stanisci RX language: providing security through role-based labelling Abstract
227. Monday, October 13, F213 Amir Herzberg (Bar Ilan University) AnonPoP: the Anonymous Post-Office Protocol Abstract
226. Monday, October 6, F213 Jiuyong Li (University of South Australia) Two probabilistic models for privacy preserving data publishing Abstract
225. Friday, October 3, F213 Mark Ryan (University of Birmingham) Balancing Societal Security and Individual Privacy: Accountable Escrow System Abstract
224. September 30 Yang Zhang Location Prediction: Communities Speak Louder than Friends Abstract
223. Monday, September 22, joint SRM and CSC-Bio seminar, Salle du Conseil David Safranek (Masaryk University) Model Checking of Biological Systems Abstract
222. Thursday, September 18, 4:00pm, F213 Alina Vdovina (Newcastle University) Expander Graphs and Beyond Abstract
221. July 29 Sasa Radomirovic (ETH, Zurich) A Complete Characterization of Secure Human-Server Communication Abstract
220. July 22 Taolue Chen (Middelsex University) Perturbation Analysis in Veriļ¬cation of Discrete-Time Markov Chains Abstract
219. July 15, F213 Qiang Tang Search in Encrypted Data: Some Results and Open Problems Abstract
218. June 10, F213 Jeroen van de Graaf (Universidade Federal de Minas Gerais, Brasil) On unconditional privacy and anonymity Abstract
217. May 13, F213 Leonid Volkov (eDemos co-founder) Two years of electronic elections for Russian opposition with eDemos Abstract
216. May 6, F213 Sebastian Eggert (CAU, Kiel, Germany) Noninterference: Unwinding and Dynamics Abstract
215. April 22 Mahmoud Mohsen (Sapienza University of Rome) Threat modeling: Theory vs. Practice Abstract
214. April 15 Reza Shokri (ETH, Zurich) Computational Privacy: Two Fundamental Problems Abstract
213. April 8 Ravi Jhawar (University of Milano) Securing Operations in Vulnerable Networks Abstract
212. April 1, F213 Christian Franck Dining Cryptographers with Verifiable Collision Resolution Abstract
211. Wednesday, March 26, 10:30am, F213 Richard Clayton (University of Cambridge, UK) Privacy/Proxy/Perfidy - what criminals (and others) put in domain whois Abstract
210. March 25, F213 Sven Übelacker (Hamburg University of Technology, Germany) The Social Engineering Personality Framework Abstract
209. Wednesday, March 19, 10:30am, E212 Olga Gadyatskaya (University of Trento) FSquaDRA: Fast Detection of Repackaged Mobile Applications Abstract
208. March 18, F213 Michel Abdalla (Ecole Normale Supérieure, Paris, France) RKA Security for PRFs Beyond the Linear Barrier Abstract
207. March 11, F213 Cas Cremers (University of Oxford) Actor Key Compromise: Consequences and Countermeasures Abstract
206. March 4 Gildas Avoine (INSA Rennes, France & UCL, Belgium) Cracking Passwords with Time-memory Trade-offs [slides] Abstract
205. February 25, F213 David Modic (University of Cambridge, UK) Reading this May Harm Your Computer: The Psychology of Malware Warnings Abstract
204. Wednesday, February 19, 2pm Alexandre Viejo (Universitat Rovira i Virgili) Preserving the User's Privacy in Web Search Engines [slides] Abstract
203. February 18, joint SRM and CSC-Bio seminar, Salle du Conseil Jaap A. Kaandorp (University of Amsterdam) Modelling gene regulation of early development and cell movement in the sea anemone Nematostella vectensis Abstract
202. January 28 Wojtek Jamroga Defendable Security in Interaction Protocols Abstract
201. January 21 Rolando Trujillo Relay attacks and distance bounding protocols Abstract
200. Thursday, January 16, F213, 4pm James Davenport (University of Bath, UK) The Security-Privacy tension: recent developments in the U.K. and elsewhere [slides] Abstract
199. January 7, F213 Jurlind Budurushi (CASED, TU Darmstadt, Germany) A systematic approach for identifying all possibilities for casting a valid/invalid vote for local elections in Hesse by using the EasyVote system Abstract