BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:66343432-6465-4965-b232-653236303562
X-WR-CALNAME:Selected Topics in Formal Methods for Security Calendar
X-WR-CALDESC:Events of the lecture Selected Topics in Formal Methods for Se
 curity
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:61393330-3736-4963-a237-636436353264
DTSTAMP:20260423T033737Z
DESCRIPTION:
DTSTART:20181108T111500Z
DTEND:20181108T130000Z
SUMMARY:Reading Group
END:VEVENT
BEGIN:VEVENT
UID:31313430-6662-4238-b464-316261383630
DTSTAMP:20260423T033737Z
DESCRIPTION:
DTSTART:20181122T111500Z
DTEND:20181122T130000Z
SUMMARY:Reading Group
END:VEVENT
BEGIN:VEVENT
UID:39623736-6438-4139-b262-666666623431
DTSTAMP:20260423T033737Z
DESCRIPTION:
DTSTART:20181213T110000Z
DTEND:20181213T130000Z
SUMMARY:Paper Presentation: 2: SAT-based model-checking for security protoc
 ols analysis
END:VEVENT
BEGIN:VEVENT
UID:62633662-3533-4436-b361-653435646264
DTSTAMP:20260423T033737Z
DESCRIPTION:
DTSTART:20181220T110000Z
DTEND:20181220T130000Z
SUMMARY:Paper Presentation: 3: Automatic Verification of Security Protocols
  in the Symbolic Model: the Verifier ProVerif
END:VEVENT
BEGIN:VEVENT
UID:39346464-3561-4764-b839-343634633035
DTSTAMP:20260423T033737Z
DESCRIPTION:
DTSTART:20190110T110000Z
DTEND:20190110T130000Z
SUMMARY:Paper Presentation: 4: Secure Information Flow as a Safety Problem
END:VEVENT
BEGIN:VEVENT
UID:65333632-3664-4364-b765-623137613566
DTSTAMP:20260423T033737Z
DESCRIPTION:
DTSTART:20190117T110000Z
DTEND:20190117T130000Z
SUMMARY:Paper Presentation: 7: Automatic Discovery and Quantification of In
 formation Leaks
END:VEVENT
BEGIN:VEVENT
UID:38646661-3134-4635-a265-323662316333
DTSTAMP:20260423T033737Z
DESCRIPTION:
DTSTART:20190124T110000Z
DTEND:20190124T130000Z
SUMMARY:Paper Presentation: 8: Verifying Constant-Time Implementations
END:VEVENT
END:VCALENDAR
