|
Workshop & Lecture Series on Technology: Policy, Law & Economics
Alessandro Acquisti, Carnegie Mellon University Heinz College 13 December 2011 - lecture 16:15-17:45h, room RAI F 41Lecture: Differential Discounting: Why Negative Actions Loom Longer than Positive Actions 14 December 2011 - workshop 16:15-17:45h, room IFW A32.1Workshop: Privacy in the Age of Augmented Reality |
|
Workshop & Lecture Series on Technology: Policy, Law & Economics
Andrei Hagiu, Harvard Business School 29 November 2011 - lecture 16:15-17:45h, room RAI F 41Lecture: Intellectual Property Intermediaries 30 November 2011 - workshop 16:15-17:45h, room IFW A32.1Workshop: Multi-Sided Platforms |
|
Workshop & Lecture Series on Technology: Policy, Law & Economics
Pierre Larouche, Tilburg Law School 15 November 2011 - lecture 16:15-17:45h, room RAI F 41Lecture: A Paradigm Shift in EU Network Industries Regulation? From a Formalistic to an Integrative Appraoch 16 November 2011 - workshop 16:15-17:45h, room IFW A32.1Title: Cloud Computing in the EU Policy Sphere |
|
Workshop & Lecture Series on Technology: Policy, Law & Economics
Susan Landau, Harvard University 1 November 2011 - lecture 16:15-17:45h, room RAI F 41Lecture: Surveillance or Security? The Risks Posed by New Wiretapping Technologies 2 November 2011 - workshop 16:15-17:45h, room IFW A32.1Workshop: Untangling Attribution: Understanding the Requirements Needed for Attribution on the Network |
|
18 Oktober 2011 - 14:00h, CNB F 110Title: TBA |
|
Workshop & Lecture Series on Technology: Policy, Law & Economics
Catherine Tucker, MIT Sloan School of Management 18 October 2011 - lecture 16:15-17:45h, room RAI F 41Lecture: How Does the Use of Trademarks by Third-Party Sellers Affect Online Search? 19 October 2011 - workshop 16:15-17:45h, room IFW A32.1Workshop: Patent Trolls and Technology Adoption |
|
Workshop & Lecture Series on Technology: Policy, Law & Economics
Christopher Yoo, University of Pennsylvania Law School 4 October 2011 - lecture 16:15-17:45h, room RAI F 41Lecture: Modularity Theory, Layering, and Internet Policy 5 October 2011 - workshop 16:15-17:45h, room IFW A32.1Workshop: Wireless Networks: Technological Challenges and Policy Implications |
|
27 September 2011 - 15:15h, CNB F 110Analysis and Mitigation of Information Leaks in Encrypted Web Browsing Traffic |
|
Workshop & Lecture Series on Technology: Policy, Law & Economics
Peter Ryan, University of Luxembourg 20 September 2011 - lecture 16:15-17:45h, room RAI F 41Lecture: Verifiable Voting Schemes in the Wild 21 September 2011 - workshop 16:15-17:45h, room IFW A32.1Workshop: Prêt à Voter with Confirmation Codes |
|
23 August 2011 - 14:00, CNB F 110A user interface for interactive security protocol design Bachelor Thesis final presentation |
|
16 August 2011 - 11:00, CNB F 110Tool Support for Authorization-Constrained Workflows Master Thesis final presentation |
|
15 August 2011 - 14:00, CNB F 110A Progress Preserving Refinement Master Thesis final presentation |
|
9 June 2011 - 14:00, CNB F 110An Approach to Modular and Testable Security Models of Real-World Health-care Applications InfSec group seminar |
|
31 May 2011 - 17:15, HG F 5Practical constructions for the efficient cryptographic enforcement of interval-based access control policies ZISC Information Security Colloquium |
|
24 May 2011 - 14:00, CNB F 110XACML Based Access Control For Key Management With OASIS KMIP |
|
24 May 2011 - 17:15, HG F 5Role Mining Techniques To Improve RBAC Administration ZISC Information Security Colloquium |
|
17 May 2011 - 17:15, HG F 5Probabilistic Role Mining ZISC Information Security Colloquium |
|
3 May 2011 - 17:15, HG F 5Physical-layer Identification of Wireless Devices ZISC Information Security Colloquium |
|
19 April 2011 - 14:00, CNB F 110Efficient Interactive Construction of Machine-Checked Protocol |
|
13 April 2011 - 14:00, CNB F 110Distributed Temporal Logic for the Analysis of Security Protocol Models |
|
12 April 2011 - 17:15, HG F 5CASED and the Future of Privacy ZISC Information Security Colloquium |
|
5 April 2011 - 17:15, HG F 5Distance-Bounding Protocol and Terrorist Fraud ZISC Information Security Colloquium |
|
5 April 2011 - 14:00, CNB F 110Model-based Testing of Security Policies Lukas Brügger |
|
8 March 2011 - 16:15, HG D 1.2Wireless Networks: From an (In)secure Present to an (Un)safe Future ZISC Information Security Colloquium |
|
22 February 2011 - 14:00, CNB F 110An Anonymous RFID Authentication Protocol and its Automated Analysis with OFMC |
8 February 2011 - 14:00, CNB F 110Execution hijacking: Improving dynamic-analysis by flying off course |
25 January 2011 - 14:00, CNB F 110An automated formal analysis of the security of the Master Thesis final presentation |
18 January 2011 - 14:00, CNB F 110The use of AI to support top-down formal system development - Group Seminar Talk |
Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne
graphische Elemente dargestellt. Die Funktionalität der
Website ist aber trotzdem gewährleistet. Wenn Sie diese
Website regelmässig benutzen, empfehlen wir Ihnen, auf
Ihrem Computer einen aktuellen Browser zu installieren. Weitere
Informationen finden Sie auf
folgender
Seite.
Important Note:
The content in this site is accessible to any browser or
Internet device, however, some graphics will display correctly
only in the newer versions of Netscape. To get the most out of
our site we suggest you upgrade to a newer browser.
More
information