Past events
A listing of previous events.
14 Jul 2016 - Andreas Lochbihler
Probabilistic functions and cryptographic oracles in higher order logic.
26 May 2016 - George Theodorakopoulos
Towards optimal protection of location privacy
12 May 2016 - Foteini Baldimtsi
Efficient Cryptographic Tools for Privacy-Preserving Applications
28 Apr 2016 - Alastair Beresford
Whack-a-mole security: incentivising the production, delivery and installation of security updates
17 Dec 2015 - Aydin Abadi
Verifiable Delegated Private Set Intersection on Outsourced Private Datasets.
05 Nov 2015 - Mariana Raykova
Candidate Construction for Indistinguishability Obfuscation and Applications
17 Sep 2015 - Andru Gheorghiu
Robustness and device independence of verifiable blind quantum computing
28 May 2015 - Anna Pappa
Quantum Coin Flipping
07 May 2015 - Peter Ryan
E2E Verifiable Voting Schemes, Theory to Practice
02 Apr 2015 - Alessandro Bruni
Set-abstractions in the Applied Pi-calculus
26 Feb 2015 - Vincent Cheval
Timing attacks in security protocols: symbolic framework and proof techniques
19 Feb 2015 - Andru Gheorghiu
Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
12 Feb 2015 - Changyu Dong
Towards Practical Data-intensive Secure Computation
29 Jan 2015 - N. Asokan
How Far Are You? Finding Path Length Between Two People On a Social Network
15 Jan 2015 - Ian Goldberg
DP5: Privacy-preserving Presence Protocols
04 Dec 2014 - David Bernhard
Cryptographic Voting: handing over the baton
27 Nov 2014 - Konstantin Knorr
Cyber Security in the Design, Development, and Maintenance of Critical Infrastructure Systems
13 Nov 2014 - Petros Wallden
Quantum Cryptography III
30 Oct 2014 - Petros Wallden
Quantum Cryptography II
16 Oct 2014 - William Waites
Distributed Denial of Service Attacks
02 Oct 2014 - Petros Wallden
Quantum Cryptography I
24 Jul 2014 - Marco Gaboardi
C. Dwork, Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (invited), 2006
10 Jul 2014 - Myrto Arapinis
V. Shoup, Sequences of Games: A tool for Taming Complexity in Security Proofs