LZI - Schloss Dagstuhl - Talks + Materials of Seminar 11332

Seminar 11332
Security and Rewriting

Hubert Comon-Lundh (ENS - Cachan, FR), Ralf Küsters (Universität Trier, DE), Catherine Meadows (Naval Research - Washington, US)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.


Seminar Wide Materials
 Tentative Schedule
Slides: pdf


Myrto Arapinis , University of Birmingham
 StatVerif: Verification of Stateful Processes
Abstracts: txt Slides: pdf


Alessandro Armando , University of Genova

Yannick Chevalier , Université Paul Sabatier - Toulouse
 Example of a Finitary Deduction System
Abstracts: txt Slides: pdf


Hubert Comon-Lundh , ENS - Cachan

Cas Cremers , ETH Zürich
 Real-world Key Exchange versus Symbolic Analysis - Where do we stand?
Abstracts: txt Slides: pdf


Stephanie Delaune , ENS - Cachan
 Trace equivalence via constraint solving
Abstracts: txt Slides: pdf


Dan Dougherty , Worcester Polytechnic Institute

Santiago Escobar , Universidad Politécnica - Valencia

Maribel Fernandez , King's College - London

Cedric Fournet , Microsoft Research UK - Cambridge

Joshua D. Guttman , Worcester Polytechnic Institute
 Logical Protocol Analysis for Implicitly Authenticated Diffie-Hellman
Abstracts: txt Slides: pdf Paper: pdf


Helene Kirchner , INRIA

Steve Kremer , ENS - Cachan
 Transforming Password Protocols to Compose
Slides: pdf

 A procedure for verifying equivalence-based properties of cryptographic protocols
Slides: pdf


Ralf Kuesters , Universität Trier

Christopher Lynch , Clarkson University - Potsdam

Catherine Meadows , Naval Research - Washington

Jose Meseguer , University of Illinois - Urbana

Sebastian Moedersheim , Technical University of Denmark - Lyngby
 My own little Hilbert's Program
Abstracts: txt Slides: pdf


Paliath Narendran , University of Albany - SUNY

Vivek Nigam , LMU München
 Timed Collaborative Systems
Abstracts: txt Slides: pdf

 On the Complexity of Linear Authorization Logics (Preliminary Results)
Abstracts: txt Slides: pdf


Michaël Rusinowitch , INRIA Lorraine

Mark D. Ryan , University of Birmingham

Ralf Sasse , University of Illinois - Urbana

Benedikt Schmidt , ETH Zürich
 Unbounded Verification and Falsification of Protocols that use Diffie-Hellman Exponentiation
Abstracts: txt


Helmut Seidl , TU München
 Horn Clauses with Disequality Constraints
Abstracts: txt Slides: pdf


Slawomir Staworko , University of Lille III

Carolyn L. Talcott , SRI - Menlo Park
 Title: Rewriting theories: relating protocol specification and analysis.
Abstracts: txt


Sophie Tison , Université de Lille I

Alwen Tiu , Australian National University - Canberra
 Intruder Deduction in Sequent Calculus
Abstracts: txt


Tomasz Truderung , University of Wroclaw

Luca Vigano , Università di Verona
 An Environmental Paradigm for Defending Security Protocols
Abstracts: txt Slides: pdf


Christoph Weidenbach , MPI für Informatik - Saarbrücken
 The Design of Logics for Automated Reasoning
Abstracts: txt Slides: pdf



Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: