Reading Group :: Pre-May 2009 Meeting Archive

The Computer Security Reading Group (CSRG) is an informal group of staff and PhD students, with the goal of broadening our knowledge and improving our understanding of computer security-related concepts and techniques. This page archives meetings prior to May 2009. Details on our current seminar series are also available.

2009 Spring Session

Date Session chair Title
20th Jan Derrick Newton Business Process Access Control - Workflow-based authorisation for complex organisations
27th Jan Tom Chothia Measuring Information Leakage Using Network Information Theory
3rd Feb Max Kanovich Collaborative Systems with Confidentiality
10th Feb Tom Chothia Analysing the MUTE Anonymous File-Sharing System Using the Pi-calculus
17th Feb Myrto Arapinis Security and privacy issues in RFID systems (Part I)
24th Feb Myrto Arapinis Security and privacy issues in RFID systems (Part II)
3rd Mar Ben Smyth (Chair) Talks from new researchers
Speakers: Masoud Koleini, Olufunmilola Onolaja, Fubiao Xia, Rehana Yasmin
10th Mar Ben Smyth Formalisation of security properties in electronic voting
17th Mar Hasan Qunoo X-Policy: Methods and Techniques to verify access control policies
24th Mar Tom Chothia Statistical Measurement of Information Leakage
31st Mar Tien Tuan Anh Dinh Enabling Secure Routing in P2P Environment With TPMs (Part I)
9th Apr Tien Tuan Anh Dinh Enabling Secure Routing in P2P Environment With TPMs (Part II)

2008 Winter Session

Date Session chair Title
10th Oct Andy Brown Specification-based Monitoring of Third-party Software on Mobile Devices
16th Oct Myrto Arapinis From one Session to many: Dynamic Tags for Security Protocols
17th Oct Peng Ning Security Research at NC State University
20th-22nd Oct ICICS'08, Hyatt Hotel, Birmingham
23rd Oct Mark Ryan Attack and fix for the Trusted Platform Module
Departmental Series (UG40)
24th Oct Joshua Guttman Cryptographic Protocol Composition via the Authentication Tests
Theory Seminar (UG40)
24th Oct Mark Ryan Group discussion: Privacy - a compromise?
Speakers: Tom Chothia, Joshua Guttman, Mark Ryan, Matt Smart
31st Oct Anongporn Salaiwarakul Analysis of a Biometric Authentication Protocol for Signature Creation Application
6th Nov Mounira Kourjieh On the decidability of reachability problems for cryptographic protocols
14th Nov Guilin Wang One-Round ID-Based Blind Signature Scheme without ROS Assumption
3rd Dec Toshiaki Tanaka Guest speaker

2008 Summer Session

Date Session chair Title Materials
4th Aug Dr Bao Fang Security can only be measured by attacks Speaker profile
Slides: pdf, ppt
Photos

2008 Spring Session

Date Session chair Title Materials
18th Jan Ben Smyth Discussion about the new research group and its website  
25th Jan Whole group Informal meeting  
8th Feb Derrick Newton Applied fusion calculus - modelling communicating processes with dynamic global constraints Abstract
18th Feb Ben Smyth Formalising zero knowledge proofs in the applied pi calculus  
25th Feb Andrew Brown Synthesising monitors from high-level policies for the safe execution of untrusted software Abstract
14th Mar Horia Corclaciuc Enforcing Security in Programming Languages using Separation Logic Abstract
28th Mar Annie Salaiwarakul Verification of integrity and secrecy properties of a biometric authentication protocol Abstract

2007 Winter Session

Date Session chair Title Materials
22nd Oct Mark Ryan Verifying e-voting protocols in the applied pi calculus Abstract, Slides
29th Oct Ben Smyth Automatic verification of privacy properties in the applied pi calculus Abstract, Slides
5th Nov Eike Ritter Towards characterising observational equivalence in the Applied Pi-Calculus Abstract, Slides
12th Nov Aybek Mukhamedov Anonymity Protocol with Identity Escrow and Analysis in the Applied pi-calculus Abstract, Slides
15th Nov Mark Ryan Departmental seminar (Thursday, 16:00, UG40)
Verifying security of electronic voting systems
Abstract
19th Nov Eike Ritter Towards characterising observational equivalence in the Applied Pi-Calculus
(...continued from 05/11/2007)
Abstract, Slides
26th Nov Guilin Wang Nominative Signatures: Concepts, Applications, Attacks, and Constructions Abstract, Slides
6th Dec Moritz Becker Departmental seminar (Thursday, 16:00, UG40)
Usable authorization policy languages and tools
Abstract

2007 Spring Session

Date Session chair Title Materials
30th Jan Mark Ryan Breaking WEP: the attack by Stubblefield, Ioannidis, Rubin, Fluhrer, Mantin, and Shamir. Notes
6th Feb Whole group CSRG poster development session Andy will provide materials and digital camera. Board photo available here. Draft poster available here.
20th Feb Derrick Newton RBAC and beyond... Slides
27th Feb Derrick Newton RBAC and beyond... Slides
6th Mar Matt Smart Fair digital cash and revocable anonymity Slides
13th Mar Horia Corcalciuc Cryptography and its analysis Abstract, Slides, Alph (source code and binaries)
20th Mar Hasan Qunoo Generating verified access control policies through model-checking Abstract, Slides, Slides (2-up)
27th Mar Ben Smyth Protocol verification using the applied pi calculus Objective: To introduce the applied pi calculus as a tool and demonstrate its practicality

2006 Winter Session

Date Session chair Title Materials
16th Oct Ben Smyth Direct anonymous attestation IBM Research - DAA; Slides
23rd Oct Aybek Mukhamedov and Mark Ryan Resolve impossibility for a contract signing protocol Paper; Slides
30th Oct Stephanie Delaune Security via constraint solving Slides
6th Nov Annie Salaiwarakul Verification of the security properties of a biometric authentication protocol Slides
13th Nov Andy Brown Controlling the execution of untrusted programs using high-level policies Slides
20th Nov Eerke Boiten A zero-knowledge interactive proof
Note: 21st Nov at 16:00 in room 245
Abstract; Slides
27th Nov Adedayo Adetoye Enforceable secure information flow policies Abstract; Slides
4th Dec Tien Tuan Anh Dinh Peer-to-peer security Slides