9.00- 9.25 welcome/coffee#

9.25- 9.30 opening#

Session 1 : 9.30-10.30#

  • Ralf Kuesters, Tomasz Truderung and Andreas Vogt. Clash Attacks on the Verifiability of E-Voting Systems
  • Veronique Cortier and Cyrille Wiedling. A formal analysis of the Norwegian e-voting protocol
  • Michael Backes, Matteo Maffei and Kim Pecina. Automated Synthesis of Privacy-Preserving Distributed Applications

10.30-10.40 short break#

Session 2 : 10.40-11.40#

  • Michael Backes, Aniket Kate, Matteo Maffei and Kim Pecina. ObliviAd: Provably Secure and Practical Online Behavioral Advertising
  • Cynthia Wagner, Jérôme François, Radu State and Thomas Engel. DANAK: Finding the Odd!
  • Matthijs Melissen, Wojciech Jamroga and Henning Schnoor. Rational Cooperation in Security Protocols

11.40-12.00 break#

Session 3 : 12.00-12.50 invited lecture#

  • Catuscia Palamidessi. Quantitative Information Flow and its Relation with Differential Privacy

12.50-14.00 lunch (buffet)#

Session 4 : 14.00-15.00#

  • Michael Backes and Sebastian Meiser. Differentially Private Smart Metering with Battery Recharging
  • Xihui Chen and Jun Pang. Exploring Query Dependency in LBS Privacy Protection
  • Fabienne Eigner and Matteo Maffei. Differential Privacy by Typing for Security Protocols

15.00-15.10 short break#

Session 5 : 15.10-16.10#

  • Alexandre Bartel, Jacques Klein, Martin Monperrus and Yves Le Traon. About ByteCode Static Analysis and Manipulation for Android Security
  • Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa and Santiago Zanella Béguelin. Verifiable Security of Merkle-Damgard: towards the Formal Verification of SHA-3 Finalists
  • Hubert Comon-Lundh, Veronique Cortier and Guillaume Scerri. Security proof with dishonest keys

16.10-16.30 break#

Session 6 : 16.30-17.10#

  • Steve Kremer, Robert Künnemann and Graham Steel. Universally Composable Key-Management
  • Michael Backes, Ian Goldberg, Aniket Kate and Esfandiar Mohammadi. Provably Secure and Practical Onion Routing
  • Ralf Kuesters, Tomasz Truderung and Juergen Graf. A Framework for the Cryptographic Verification of Java-like Programs (NOT PRESENTED)

17.10 closing#

Ajouter un attachement

Seuls les utilisateurs autorisés peuvent publier de nouveaux attachements.

Liste des attachements

Type Nom de l'attachement Taille Version Date de modification Auteur Modifier la note
html
accepted.html 25,3 ko 1 28-févr.-2012 16:37 Rusinowitch
« Cette page (révision-11) a été modifiée pour la dernière fois le 15-mars-2012 09:30 par Rusinowitch