!9.00- 9.25 welcome/coffee

!9.25- 9.30 opening

!!Session 1 :  9.30-10.30

* Ralf Kuesters, Tomasz Truderung and Andreas Vogt. Clash Attacks on the Verifiability of E-Voting Systems
* Veronique Cortier and Cyrille Wiedling. A formal analysis of the Norwegian e-voting protocol
* Michael Backes, Matteo Maffei and Kim Pecina. Automated Synthesis of Privacy-Preserving Distributed Applications

!10.30-10.40 short break

!!Session 2 : 10.40-11.40

* Michael Backes, Aniket Kate, Matteo Maffei and Kim Pecina. ObliviAd: Provably Secure and Practical Online Behavioral Advertising
* Cynthia Wagner, Jérôme François, Radu State and Thomas Engel. DANAK: Finding the Odd!
* Matthijs Melissen, Wojciech Jamroga and Henning Schnoor. Rational Cooperation in Security Protocols

!11.40-12.00 break

!!Session 3 : 12.00-12.50 invited lecture

* Catuscia Palamidessi. Quantitative Information Flow and its Relation with Differential Privacy

!12.50-14.00 lunch (buffet)

!!Session 4 : 14.00-15.00

* Michael Backes and Sebastian Meiser. Differentially Private Smart Metering with Battery Recharging
* Xihui Chen and Jun Pang. Exploring Query Dependency in LBS Privacy Protection
* Fabienne Eigner and Matteo Maffei. Differential Privacy by Typing for Security Protocols

!15.00-15.10 short break

!!Session 5 : 15.10-16.10

* Alexandre Bartel, Jacques Klein, Martin Monperrus and Yves Le Traon. About ByteCode Static Analysis and Manipulation for Android Security
* Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa and Santiago Zanella Béguelin. Verifiable Security of Merkle-Damgard: towards the Formal Verification of SHA-3 Finalists
* Hubert Comon-Lundh, Veronique Cortier and Guillaume Scerri. Security proof with dishonest keys

!16.10-16.30 break

!!Session 6 : 16.30-17.10

* Steve Kremer, Robert Künnemann and Graham Steel. Universally Composable Key-Management
* Michael Backes, Ian Goldberg, Aniket Kate and Esfandiar Mohammadi. Provably Secure and Practical Onion Routing
* Ralf Kuesters, Tomasz Truderung and Juergen Graf. A Framework for the Cryptographic Verification of Java-like Programs (NOT PRESENTED)

!17.10       closing