LZI - Schloss Dagstuhl - Talks + Materials of Seminar 11332
 Functions: 

Seminar 11332
Security and Rewriting

Hubert Comon-Lundh (ENS - Cachan, FR), Ralf Küsters (Universität Trier, DE), Catherine Meadows (Naval Research - Washington, US)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.

 

Seminar Wide Materials
 
 Tentative Schedule
Slides: pdf

 


Myrto Arapinis , University of Birmingham
 StatVerif: Verification of Stateful Processes
Abstracts: txt Slides: pdf

 

Alessandro Armando , University of Genova
 

Yannick Chevalier , Université Paul Sabatier - Toulouse
 Example of a Finitary Deduction System
Abstracts: txt Slides: pdf

 

Hubert Comon-Lundh , ENS - Cachan
 

Cas Cremers , ETH Zürich
 Real-world Key Exchange versus Symbolic Analysis - Where do we stand?
Abstracts: txt Slides: pdf

 

Stephanie Delaune , ENS - Cachan
 Trace equivalence via constraint solving
Abstracts: txt Slides: pdf

 

Dan Dougherty , Worcester Polytechnic Institute
 

Santiago Escobar , Universidad Politécnica - Valencia
 

Maribel Fernandez , King's College - London
 

Cedric Fournet , Microsoft Research UK - Cambridge
 

Joshua D. Guttman , Worcester Polytechnic Institute
 Logical Protocol Analysis for Implicitly Authenticated Diffie-Hellman
Abstracts: txt Slides: pdf Paper: pdf

 

Helene Kirchner , INRIA
 

Steve Kremer , ENS - Cachan
 Transforming Password Protocols to Compose
Slides: pdf

 A procedure for verifying equivalence-based properties of cryptographic protocols
Slides: pdf

 

Ralf Kuesters , Universität Trier
 

Christopher Lynch , Clarkson University - Potsdam
 

Catherine Meadows , Naval Research - Washington
 

Jose Meseguer , University of Illinois - Urbana
 

Sebastian Moedersheim , Technical University of Denmark - Lyngby
 My own little Hilbert's Program
Abstracts: txt Slides: pdf

 

Paliath Narendran , University of Albany - SUNY
 

Vivek Nigam , LMU München
 Timed Collaborative Systems
Abstracts: txt Slides: pdf

 On the Complexity of Linear Authorization Logics (Preliminary Results)
Abstracts: txt Slides: pdf

 

Michaël Rusinowitch , INRIA Lorraine
 

Mark D. Ryan , University of Birmingham
 

Ralf Sasse , University of Illinois - Urbana
 

Benedikt Schmidt , ETH Zürich
 Unbounded Verification and Falsification of Protocols that use Diffie-Hellman Exponentiation
Abstracts: txt

 

Helmut Seidl , TU München
 Horn Clauses with Disequality Constraints
Abstracts: txt Slides: pdf

 

Slawomir Staworko , University of Lille III
 

Carolyn L. Talcott , SRI - Menlo Park
 Title: Rewriting theories: relating protocol specification and analysis.
Abstracts: txt

 

Sophie Tison , Université de Lille I
 

Alwen Tiu , Australian National University - Canberra
 Intruder Deduction in Sequent Calculus
Abstracts: txt

 

Tomasz Truderung , University of Wroclaw
 

Luca Vigano , Università di Verona
 An Environmental Paradigm for Defending Security Protocols
Abstracts: txt Slides: pdf

 

Christoph Weidenbach , MPI für Informatik - Saarbrücken
 The Design of Logics for Automated Reasoning
Abstracts: txt Slides: pdf

 



License

Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: