A listing of previous events. 14 Jul 2016 - Andreas Lochbihler Probabilistic functions and cryptographic oracles in higher order logic. 26 May 2016 - George Theodorakopoulos Towards optimal protection of location privacy 12 May 2016 - Foteini Baldimtsi Efficient Cryptographic Tools for Privacy-Preserving Applications 28 Apr 2016 - Alastair Beresford Whack-a-mole security: incentivising the production, delivery and installation of security updates 17 Dec 2015 - Aydin Abadi Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. 05 Nov 2015 - Mariana Raykova Candidate Construction for Indistinguishability Obfuscation and Applications 17 Sep 2015 - Andru Gheorghiu Robustness and device independence of verifiable blind quantum computing 28 May 2015 - Anna Pappa Quantum Coin Flipping 07 May 2015 - Peter Ryan E2E Verifiable Voting Schemes, Theory to Practice 02 Apr 2015 - Alessandro Bruni Set-abstractions in the Applied Pi-calculus 26 Feb 2015 - Vincent Cheval Timing attacks in security protocols: symbolic framework and proof techniques 19 Feb 2015 - Andru Gheorghiu Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers 12 Feb 2015 - Changyu Dong Towards Practical Data-intensive Secure Computation 29 Jan 2015 - N. Asokan How Far Are You? Finding Path Length Between Two People On a Social Network 15 Jan 2015 - Ian Goldberg DP5: Privacy-preserving Presence Protocols 04 Dec 2014 - David Bernhard Cryptographic Voting: handing over the baton 27 Nov 2014 - Konstantin Knorr Cyber Security in the Design, Development, and Maintenance of Critical Infrastructure Systems 13 Nov 2014 - Petros Wallden Quantum Cryptography III 30 Oct 2014 - Petros Wallden Quantum Cryptography II 16 Oct 2014 - William Waites Distributed Denial of Service Attacks 02 Oct 2014 - Petros Wallden Quantum Cryptography I 24 Jul 2014 - Marco Gaboardi C. Dwork, Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (invited), 2006 10 Jul 2014 - Myrto Arapinis V. Shoup, Sequences of Games: A tool for Taming Complexity in Security Proofs This article was published on 2024-11-22