The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in E212 on the Kirchberg Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.
If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Jean Lancrenon or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.
No. | Date | Presenter | Title | Abstracts |
---|---|---|---|---|
254 | December 15, F213 | Alfredo Rial (IBM research, Zurich) | Stateful Zero-Knowlege and UC Commitments | Abstract |
253 | November 17, F213 | Jiuyong Li (University of South Australia) | From association analysis to causal relationship exploration | Abstract |
252 | November 10, F213 | Patrick Longa (Microsoft Research) | FourQ: pushing the limits of curve-based cryptography | Abstract |
251 | October 27 | Hongyang Qu (University of Sheffield) | Model Checking for Investigation of Pursuit-Evasion Strategies | Abstract |
250 | October 20 | Tim Willemse (Eindhoven University of Technology) | Games and (bi)simulations | Abstract |
249 | September 22, F213 | Anastasia Sergeeva (ITMO University, St.Petersburg, Russia) | Human Factor and Information Security | Abstract |
248 | September 15, F213 | Taciane Martimiano (University of Santa Catarina, Brazil) | Threat Modelling Service Security and Privacy as a Security Ceremony | Abstract |
247 | Friday, June 26, F213 | Bill Roscoe (University of Oxford) | Out of band channels and non-standard authentication | Abstract |
246 | June 9 | Haoyi Xiong (Institut Mines-Telecom) | From Coverage to Sparsity - Mobile Crowdsensing for Environment Monitoring in Smart Cities | Abstract |
245 | June 2, F213 | Qiang Tang | Homomorphic encryption and recommender system privacy | Abstract |
244 | Wednesday, May 20 | Richard Clayton (University of Cambridge) | Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm | Abstract |
243 | May 12, F213 | Maina Olembo (CASED, Darmstadt) | Cast-as-Intended Verification in Helios: Exploring Usability and Voter Involvement | Abstract |
242 | May 5 | Jintai Ding (University of Cincinnati, USA) | A simple and provable secure (Authenticated) Key Exchange based on LWE | Abstract |
241 | Monday, May 4, E112 | Hugo Jonker (Open University, The Netherlands) | FP-Block: Usable web-privacy by controlling browser fingerprinting | Abstract |
240 | April 28 | Hongyang Qu (Sheffield University) | On Efficient Consistency Checks by Robots | Abstract |
239 | Wednesday, April 22, 11:30am | David Naccache (ENS, Paris) | On Darwinism and side-channel resistance | |
238 | April 14 | Ismael González Yero (Universidad de Cádiz) | From the identification of vertices in a graph to non-identification: a short story with ending in privacy for social graphs | Abstract |
237 | March 17, F213 | Erman Ayday (Bilkent University, Turkey) | Security and Privacy in the Age of Big Data: The Case of Genomics | Abstract |
236 | February 20 | Yury Zhauniarovic (University of Trento) | StaDynA: Addressing the problem of dynamic code updates in the security analysis of Android applications | Abstract |
235 | February 3, F213 | Roberto Araujo (Universidade Federal do Pará, Brasil) | A generic ABRTY based coercion-resistant voting scheme (work in progress) | Abstract |
234 | January 27 | Qixia Yuan | Efficient Algorithms for Steady-state Analysis of Large Probabilistic Boolean Networks | Abstract |