BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.71//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:34376639-3963-4630-b736-376566306638
X-WR-CALNAME:Selected Topics in Formal Methods for Security Calendar
X-WR-CALDESC:Events of the lecture Selected Topics in Formal Methods for Se
 curity
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:62616239-3562-4831-a336-356433383930
DTSTAMP:20260312T011523Z
DESCRIPTION:
DTSTART:20181108T111500Z
DTEND:20181108T130000Z
SUMMARY:Reading Group
END:VEVENT
BEGIN:VEVENT
UID:63393235-3166-4135-b264-383462343530
DTSTAMP:20260312T011523Z
DESCRIPTION:
DTSTART:20181122T111500Z
DTEND:20181122T130000Z
SUMMARY:Reading Group
END:VEVENT
BEGIN:VEVENT
UID:61373164-3362-4364-b263-663231386161
DTSTAMP:20260312T011523Z
DESCRIPTION:
DTSTART:20181213T110000Z
DTEND:20181213T130000Z
SUMMARY:Paper Presentation: 2: SAT-based model-checking for security protoc
 ols analysis
END:VEVENT
BEGIN:VEVENT
UID:31396532-3461-4539-a638-306335336164
DTSTAMP:20260312T011523Z
DESCRIPTION:
DTSTART:20181220T110000Z
DTEND:20181220T130000Z
SUMMARY:Paper Presentation: 3: Automatic Verification of Security Protocols
  in the Symbolic Model: the Verifier ProVerif
END:VEVENT
BEGIN:VEVENT
UID:63313366-6135-4535-b663-333838613937
DTSTAMP:20260312T011523Z
DESCRIPTION:
DTSTART:20190110T110000Z
DTEND:20190110T130000Z
SUMMARY:Paper Presentation: 4: Secure Information Flow as a Safety Problem
END:VEVENT
BEGIN:VEVENT
UID:37383563-3533-4438-a337-346363626136
DTSTAMP:20260312T011523Z
DESCRIPTION:
DTSTART:20190117T110000Z
DTEND:20190117T130000Z
SUMMARY:Paper Presentation: 7: Automatic Discovery and Quantification of In
 formation Leaks
END:VEVENT
BEGIN:VEVENT
UID:37643965-6236-4733-a265-376239323766
DTSTAMP:20260312T011523Z
DESCRIPTION:
DTSTART:20190124T110000Z
DTEND:20190124T130000Z
SUMMARY:Paper Presentation: 8: Verifying Constant-Time Implementations
END:VEVENT
END:VCALENDAR
