The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in E212 on the Kirchberg Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.
If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Jean Lancrenon or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.
No. | Date | Presenter | Title | Abstracts |
---|---|---|---|---|
233. | December 16 | Federica Paci (University of Trento) | How do you know that a security risk assessment method work? An empirical approach | Abstract |
232. | December 9, F213 | Vincenzo Iovino | Simulation-based secure functional encryption in the random oracle model | Abstract |
231. | December 2 | Anton Wijs (Eindhoven University of Technology) | GPU-Based Graph Decomposition into Strongly Connected and Maximal End Components | Abstract |
230. | November 25 | Andrzej Mizera | Probabilistic Boolean Networks: a modelling framework for large biological systems | Abstract |
229. | Thursday, November 20, F213 | Mark Manulis (University of Surrey) | Cryptographic Password Authentication with TLS Channel Bindings | Abstract |
228. | Tuesday, November 11 | Marcello Stanisci | RX language: providing security through role-based labelling | Abstract |
227. | Monday, October 13, F213 | Amir Herzberg (Bar Ilan University) | AnonPoP: the Anonymous Post-Office Protocol | Abstract |
226. | Monday, October 6, F213 | Jiuyong Li (University of South Australia) | Two probabilistic models for privacy preserving data publishing | Abstract |
225. | Friday, October 3, F213 | Mark Ryan (University of Birmingham) | Balancing Societal Security and Individual Privacy: Accountable Escrow System | Abstract |
224. | September 30 | Yang Zhang | Location Prediction: Communities Speak Louder than Friends | Abstract |
223. | Monday, September 22, joint SRM and CSC-Bio seminar, Salle du Conseil | David Safranek (Masaryk University) | Model Checking of Biological Systems | Abstract |
222. | Thursday, September 18, 4:00pm, F213 | Alina Vdovina (Newcastle University) | Expander Graphs and Beyond | Abstract |
221. | July 29 | Sasa Radomirovic (ETH, Zurich) | A Complete Characterization of Secure Human-Server Communication | Abstract |
220. | July 22 | Taolue Chen (Middelsex University) | Perturbation Analysis in Veriļ¬cation of Discrete-Time Markov Chains | Abstract |
219. | July 15, F213 | Qiang Tang | Search in Encrypted Data: Some Results and Open Problems | Abstract |
218. | June 10, F213 | Jeroen van de Graaf (Universidade Federal de Minas Gerais, Brasil) | On unconditional privacy and anonymity | Abstract |
217. | May 13, F213 | Leonid Volkov (eDemos co-founder) | Two years of electronic elections for Russian opposition with eDemos | Abstract |
216. | May 6, F213 | Sebastian Eggert (CAU, Kiel, Germany) | Noninterference: Unwinding and Dynamics | Abstract |
215. | April 22 | Mahmoud Mohsen (Sapienza University of Rome) | Threat modeling: Theory vs. Practice | Abstract |
214. | April 15 | Reza Shokri (ETH, Zurich) | Computational Privacy: Two Fundamental Problems | Abstract |
213. | April 8 | Ravi Jhawar (University of Milano) | Securing Operations in Vulnerable Networks | Abstract |
212. | April 1, F213 | Christian Franck | Dining Cryptographers with Verifiable Collision Resolution | Abstract |
211. | Wednesday, March 26, 10:30am, F213 | Richard Clayton (University of Cambridge, UK) | Privacy/Proxy/Perfidy - what criminals (and others) put in domain whois | Abstract |
210. | March 25, F213 | Sven Übelacker (Hamburg University of Technology, Germany) | The Social Engineering Personality Framework | Abstract |
209. | Wednesday, March 19, 10:30am, E212 | Olga Gadyatskaya (University of Trento) | FSquaDRA: Fast Detection of Repackaged Mobile Applications | Abstract |
208. | March 18, F213 | Michel Abdalla (Ecole Normale Supérieure, Paris, France) | RKA Security for PRFs Beyond the Linear Barrier | Abstract |
207. | March 11, F213 | Cas Cremers (University of Oxford) | Actor Key Compromise: Consequences and Countermeasures | Abstract |
206. | March 4 | Gildas Avoine (INSA Rennes, France & UCL, Belgium) | Cracking Passwords with Time-memory Trade-offs [slides] | Abstract |
205. | February 25, F213 | David Modic (University of Cambridge, UK) | Reading this May Harm Your Computer: The Psychology of Malware Warnings | Abstract |
204. | Wednesday, February 19, 2pm | Alexandre Viejo (Universitat Rovira i Virgili) | Preserving the User's Privacy in Web Search Engines [slides] | Abstract |
203. | February 18, joint SRM and CSC-Bio seminar, Salle du Conseil | Jaap A. Kaandorp (University of Amsterdam) | Modelling gene regulation of early development and cell movement in the sea anemone Nematostella vectensis | Abstract |
202. | January 28 | Wojtek Jamroga | Defendable Security in Interaction Protocols | Abstract |
201. | January 21 | Rolando Trujillo | Relay attacks and distance bounding protocols | Abstract |
200. | Thursday, January 16, F213, 4pm | James Davenport (University of Bath, UK) | The Security-Privacy tension: recent developments in the U.K. and elsewhere [slides] | Abstract |
199. | January 7, F213 | Jurlind Budurushi (CASED, TU Darmstadt, Germany) | A systematic approach for identifying all possibilities for casting a valid/invalid vote for local elections in Hesse by using the EasyVote system | Abstract |