printlogo
ETH Zuerich - Homepage
Information Security
 
print
  

Talks in 2011

IP_logo
Workshop & Lecture Series on Technology: Policy, Law & Economics

Alessandro Acquisti, Carnegie Mellon University Heinz College

13 December 2011 - lecture 16:15-17:45h, room RAI F 41

Lecture: Differential Discounting: Why Negative Actions Loom Longer than Positive Actions

14 December 2011 - workshop 16:15-17:45h, room IFW A32.1

Workshop: Privacy in the Age of Augmented Reality

IP_logo
Workshop & Lecture Series on Technology: Policy, Law & Economics

Andrei Hagiu, Harvard Business School

29 November 2011 - lecture 16:15-17:45h, room RAI F 41

Lecture: Intellectual Property Intermediaries

30 November 2011 - workshop 16:15-17:45h, room IFW A32.1

Workshop: Multi-Sided Platforms

IP_logo
Workshop & Lecture Series on Technology: Policy, Law & Economics

Pierre Larouche, Tilburg Law School

15 November 2011 - lecture 16:15-17:45h, room RAI F 41

Lecture: A Paradigm Shift in EU Network Industries Regulation? From a Formalistic to an Integrative Appraoch

16 November 2011 - workshop 16:15-17:45h, room IFW A32.1

Title: Cloud Computing in the EU Policy Sphere

IP_logo
Workshop & Lecture Series on Technology: Policy, Law & Economics

Susan Landau, Harvard University

1 November 2011 - lecture 16:15-17:45h, room RAI F 41

Lecture: Surveillance or Security? The Risks Posed by New Wiretapping Technologies

2 November 2011 - workshop 16:15-17:45h, room IFW A32.1

Workshop: Untangling Attribution: Understanding the Requirements Needed for Attribution on the Network

infseclogo
18 Oktober 2011 - 14:00h, CNB F 110

Title: TBA
NESSOS presentation
Nataliia Bielova, University of Trento Italy

IP_logo
Workshop & Lecture Series on Technology: Policy, Law & Economics

Catherine Tucker, MIT Sloan School of Management

18 October 2011 - lecture 16:15-17:45h, room RAI F 41

Lecture: How Does the Use of Trademarks by Third-Party Sellers Affect Online Search?

19 October 2011 - workshop 16:15-17:45h, room IFW A32.1

Workshop: Patent Trolls and Technology Adoption

IP_logo
Workshop & Lecture Series on Technology: Policy, Law & Economics

Christopher Yoo, University of Pennsylvania Law School

4 October 2011 - lecture 16:15-17:45h, room RAI F 41

Lecture: Modularity Theory, Layering, and Internet Policy

5 October 2011 - workshop 16:15-17:45h, room IFW A32.1

Workshop: Wireless Networks: Technological Challenges and Policy Implications

zisclogo
27 September 2011 - 15:15h, CNB F 110

Analysis and Mitigation of Information Leaks in Encrypted Web Browsing Traffic
Master Thesis presentation
Goran Doychev, Saarland University

IP_logo
Workshop & Lecture Series on Technology: Policy, Law & Economics

Peter Ryan, University of Luxembourg

20 September 2011 - lecture 16:15-17:45h, room RAI F 41

Lecture: Verifiable Voting Schemes in the Wild

21 September 2011 - workshop 16:15-17:45h, room IFW A32.1

Workshop: Prêt à Voter with Confirmation Codes

infseclogo
23 August 2011 - 14:00, CNB F 110

A user interface for interactive security protocol design

Bachelor Thesis final presentation
Cedric Staub, ETH Zurich

infseclogo
16 August 2011 - 11:00, CNB F 110

Tool Support for Authorization-Constrained Workflows

Master Thesis final presentation
Dominik Rüegger, IBM Rüschlikon

infseclogo
15 August 2011 - 14:00, CNB F 110

A Progress Preserving Refinement

Master Thesis final presentation
Simon Hudon, ETH Zurich

infseclogo
9 June 2011 - 14:00, CNB F 110

An Approach to Modular and Testable Security Models of Real-World Health-care Applications

InfSec group seminar
Lukas Brügger, ETH Zurich

zisclogo
31 May 2011 - 17:15, HG F 5

Practical constructions for the efficient cryptographic enforcement of interval-based access control policies

ZISC Information Security Colloquium
Jason Crampton, Royal Holloway, University of London

infseclogo
24 May 2011 - 14:00, CNB F 110

XACML Based Access Control For Key Management With OASIS KMIP
Master Thesis final presentation
Divay Bansal

   
zisclogo
24 May 2011 - 17:15, HG F 5

Role Mining Techniques To Improve RBAC Administration

ZISC Information Security Colloquium
Roberto di Pietro, Uni Roma

zisclogo
17 May 2011 - 17:15, HG F 5

Probabilistic Role Mining

ZISC Information Security Colloquium
Mario Frank, ETH Zurich

zisclogo
3 May 2011 - 17:15, HG F 5

Physical-layer Identification of Wireless Devices

ZISC Information Security Colloquium
Boris Danev, ETH Zurich

infseclogo
19 April 2011 - 14:00, CNB F 110

Efficient Interactive Construction of Machine-Checked Protocol
Master Thesis final presentation
Martin Schaub

infseclogo
13 April 2011 - 14:00, CNB F 110

Distributed Temporal Logic for the Analysis of Security Protocol Models
Carlos Caleiro, SQIG-IT, Lisbon, Portugal

zisclogo
12 April 2011 - 17:15, HG F 5

CASED and the Future of Privacy

ZISC Information Security Colloquium
Michael Waidner, Fraunhofer-Institut für Sichere Informationstechnologie

zisclogo
5 April 2011 - 17:15, HG F 5

Distance-Bounding Protocol and Terrorist Fraud

ZISC Information Security Colloquium
Cedric Lauradoux, INRIA

infseclogo
5 April 2011 - 14:00, CNB F 110

Model-based Testing of Security Policies

Lukas Brügger

zisclogo
8 March 2011 - 16:15, HG D 1.2

Wireless Networks: From an (In)secure Present to an (Un)safe Future

ZISC Information Security Colloquium
Srdjan Capkun, ETH Zurich

infseclogo
22 February 2011 - 14:00, CNB F 110

An Anonymous RFID Authentication Protocol and its Automated Analysis with OFMC
Master Thesis final presentation
Mahdi Asadpour

infseclogo
8 February 2011 - 14:00, CNB F 110

Execution hijacking: Improving dynamic-analysis by flying off course
Group Seminar Talk
Petar Tsankov

infseclogo
25 January 2011 - 14:00, CNB F 110

An automated formal analysis of the security of the
Internet Key Exchange (IKE) protocol in the presence of
compromising adversaries

Master Thesis final presentation
Adrian Kyburz

infseclogo
18 January 2011 - 14:00, CNB F 110

The use of AI to support top-down formal system development - Group Seminar Talk
Gudmund Grov

 

Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
folgender Seite.

Important Note:
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
More information

© 2011 ETH Zurich | Imprint | Disclaimer | 6 September 2011
top