SRM seminar

The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in E212 on the Kirchberg Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.

If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Jean Lancrenon or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.


No. Date Presenter Title Abstracts
254 December 15, F213 Alfredo Rial (IBM research, Zurich) Stateful Zero-Knowlege and UC Commitments Abstract
253 November 17, F213 Jiuyong Li (University of South Australia) From association analysis to causal relationship exploration Abstract
252 November 10, F213 Patrick Longa (Microsoft Research) FourQ: pushing the limits of curve-based cryptography Abstract
251 October 27 Hongyang Qu (University of Sheffield) Model Checking for Investigation of Pursuit-Evasion Strategies Abstract
250 October 20 Tim Willemse (Eindhoven University of Technology) Games and (bi)simulations Abstract
249 September 22, F213 Anastasia Sergeeva (ITMO University, St.Petersburg, Russia) Human Factor and Information Security Abstract
248 September 15, F213 Taciane Martimiano (University of Santa Catarina, Brazil) Threat Modelling Service Security and Privacy as a Security Ceremony Abstract
247 Friday, June 26, F213 Bill Roscoe (University of Oxford) Out of band channels and non-standard authentication Abstract
246 June 9 Haoyi Xiong (Institut Mines-Telecom) From Coverage to Sparsity - Mobile Crowdsensing for Environment Monitoring in Smart Cities Abstract
245 June 2, F213 Qiang Tang Homomorphic encryption and recommender system privacy Abstract
244 Wednesday, May 20 Richard Clayton (University of Cambridge) Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm Abstract
243 May 12, F213 Maina Olembo (CASED, Darmstadt) Cast-as-Intended Verification in Helios: Exploring Usability and Voter Involvement Abstract
242 May 5 Jintai Ding (University of Cincinnati, USA) A simple and provable secure (Authenticated) Key Exchange based on LWE Abstract
241 Monday, May 4, E112 Hugo Jonker (Open University, The Netherlands) FP-Block: Usable web-privacy by controlling browser fingerprinting Abstract
240 April 28 Hongyang Qu (Sheffield University) On Efficient Consistency Checks by Robots Abstract
239 Wednesday, April 22, 11:30am David Naccache (ENS, Paris) On Darwinism and side-channel resistance
238 April 14 Ismael González Yero (Universidad de Cádiz) From the identification of vertices in a graph to non-identification: a short story with ending in privacy for social graphs Abstract
237 March 17, F213 Erman Ayday (Bilkent University, Turkey) Security and Privacy in the Age of Big Data: The Case of Genomics Abstract
236 February 20 Yury Zhauniarovic (University of Trento) StaDynA: Addressing the problem of dynamic code updates in the security analysis of Android applications Abstract
235 February 3, F213 Roberto Araujo (Universidade Federal do Pará, Brasil) A generic ABRTY based coercion-resistant voting scheme (work in progress) Abstract
234 January 27 Qixia Yuan Efficient Algorithms for Steady-state Analysis of Large Probabilistic Boolean Networks Abstract