|
Programme | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Open session: Wed, 17.45:Simon Meier (ETH Zurich) Specifying Security Protocols such that They are Correct by Construction Thu, 17.45: David Williams (University of Surrey) Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol Thu, 18.30: Visit to the Museum of the Three Religions (inner court of the Fortress, close to the PC Lab) Fri, 17.15: Enrico Scalavino (Imperial College London) Policies and their Enforcement in Usage and Dissemination Control Fri, 17.45: Serena Elisa Ponta (DIST Genova) Model Checking of Security-sensitive Service-oriented Business Processes Fri, 18.15: Max Tuengerthal (University of Trier) Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation Sat, 17.15: Ton van Deursen (University of Luxembourg) RFID protocol design and verification Sat, 17.45: Baskar Anguraj (Chennai Mathematical Institute) Knowledge-based Modelling of Voting Protocols |