Timetable
Speakers
Short Seminars
|
Timetable
|
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
|
Sun |
Mon |
Tue |
Wed |
Thu |
Fri |
Sat |
Sun |
Mon |
Tue |
Wed |
Thu |
Fri |
Sat |
08.00-09.00 |
arrivals between 18.00 and 21.00 |
breakfast |
departures |
09.00-11.00 |
AC |
JS |
AC |
MMCS |
JS |
|
|
SC |
NCSM |
LSP |
CTP |
NCSM |
11.00-11.30 |
coffee break |
|
|
coffee break |
11.30-13.30 |
S3 |
AC |
JS |
CSP |
MMCS |
|
|
CTP |
LSP |
SC |
SC |
CTP |
13.30-14.30 |
lunch |
15.00-17.00 |
S1 |
CSP |
S2 |
JS |
S4 |
|
|
LSP |
CTP |
S5 |
NCSM |
S6 |
17.00-17.30 |
tea break |
|
|
tea break |
departures |
17.30-19.30 |
CSP |
|
MMCS |
|
|
|
|
|
SC |
|
|
S1: Introduction to Cryptography.
S2: Applied Cryptography.
S3: Control Flow Analysis for Security.
S4: Model checking using a logic of belief.
S5: Planning, logic programs and security protocols.
S6: Testing for spi Processes.
JS: | Java Security (Gong). |
NCSM: | Nominal Calculi for
Security and Mobility (Gordon). |
CSP: | Classification of
Security Properties (Gorrieri / Focardi). |
SC: | Security Goals: packet
trajectories and strand spaces (Guttman). |
MMCS: | Mathematical Models of
Computer Security (Ryan). |
AC: | Access Control: policies,
models, architectures and mechanisms (Samarati). |
LSP: | The Logic of Security
Protocols (Syverson). |
CTP: | Cryptographic Technology and
Protocols in E-Commerce (Yung). |
|