9.00- 9.25 welcome/coffee#

9.25- 9.30 opening#

Session 1 : 9.30-10.30#

  • Ralf Kuesters, Tomasz Truderung and Andreas Vogt. Clash Attacks on the Verifiability of E-Voting Systems
  • Veronique Cortier and Cyrille Wiedling. A formal analysis of the Norwegian e-voting protocol
  • Michael Backes, Matteo Maffei and Kim Pecina. Automated Synthesis of Privacy-Preserving Distributed Applications

10.30-10.40 short break#

Session 2 : 10.40-11.40#

  • Michael Backes, Aniket Kate, Matteo Maffei and Kim Pecina. ObliviAd: Provably Secure and Practical Online Behavioral Advertising
  • Cynthia Wagner, Jérôme François, Radu State and Thomas Engel. DANAK: Finding the Odd!
  • Matthijs Melissen, Wojciech Jamroga and Henning Schnoor. Rational Cooperation in Security Protocols

11.40-12.00 break#

Session 3 : 12.00-12.50 invited lecture#

  • Catuscia Palamidessi. Quantitative Information Flow and its Relation with Differential Privacy

12.50-14.00 lunch (buffet)#

Session 4 : 14.00-15.00#

  • Michael Backes and Sebastian Meiser. Differentially Private Smart Metering with Battery Recharging
  • Xihui Chen and Jun Pang. Exploring Query Dependency in LBS Privacy Protection
  • Fabienne Eigner and Matteo Maffei. Differential Privacy by Typing for Security Protocols

15.00-15.10 short break#

Session 5 : 15.10-16.10#

  • Alexandre Bartel, Jacques Klein, Martin Monperrus and Yves Le Traon. About ByteCode Static Analysis and Manipulation for Android Security
  • Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa and Santiago Zanella Béguelin. Verifiable Security of Merkle-Damgard: towards the Formal Verification of SHA-3 Finalists
  • Hubert Comon-Lundh, Veronique Cortier and Guillaume Scerri. Security proof with dishonest keys

16.10-16.30 break#

Session 6 : 16.30-17.10#

  • Steve Kremer, Robert Künnemann and Graham Steel. Universally Composable Key-Management
  • Michael Backes, Ian Goldberg, Aniket Kate and Esfandiar Mohammadi. Provably Secure and Practical Onion Routing
  • Ralf Kuesters, Tomasz Truderung and Juergen Graf. A Framework for the Cryptographic Verification of Java-like Programs (NOT PRESENTED)

17.10 closing#

Add new attachment

Only authorized users are allowed to upload new attachments.

List of attachments

Kind Attachment Name Size Version Date Modified Author Change note
html
accepted.html 25.3 kB 1 28-Feb-2012 16:37 Rusinowitch
« This page (revision-11) was last changed on 15-mars-2012 09:30 by Rusinowitch