From 09:00 | Coffee & croissants | |
09:00-09:30 | Geoffrey Smith | Vulnerability Bounds for Cryptography under Timing Attacks |
09:30-10:00 | Mark Ryan | Analysing hardware-based security APIs |
10:00-10:30 | MohammadReza Mousavi | Delegation and Revocation in Language-Based Security |
10:30-11:00 | Steve Kremer | Deciding trace equivalence in cryptographic process calculi for a
bounded number of sessions |
11:00-11:30 | Coffee break | |
11:30-12:00 | Josée Desharnais | Approximate bisimulation and a corresponding metric |
12:00-12:30 | Miguel E. Andrés | Conditional Probabilities over Probabilistic and Nondeterministic Systems |
12:30-14:00 | Lunch | |
14:00-14:30 | Philippe Darondeau | Opacity Control |
14:30-15:00 | Michele Boreale | Some remarks on indistinguishability and probability of error |
15:00-15:30 | Coffee break | |
15:30-16:00 | Catuscia Palamidessi | Information Theory and Information Flow |
16:00-16:30 | Mário S. Alvim | Interactive Information Flow |
16:30-17:00 | Romain Beauxis | Oblivious schedulers and information flow |