BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:63626234-3061-4235-b264-383436653937
X-WR-CALNAME:Selected Topics in Formal Methods for Security Calendar
X-WR-CALDESC:Events of the lecture Selected Topics in Formal Methods for Se
 curity
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:39633132-3333-4236-b634-366131383965
DTSTAMP:20260521T062342Z
DESCRIPTION:
DTSTART:20181108T111500Z
DTEND:20181108T130000Z
SUMMARY:Reading Group
END:VEVENT
BEGIN:VEVENT
UID:37646139-6266-4232-b661-633863663864
DTSTAMP:20260521T062342Z
DESCRIPTION:
DTSTART:20181122T111500Z
DTEND:20181122T130000Z
SUMMARY:Reading Group
END:VEVENT
BEGIN:VEVENT
UID:36626538-6534-4434-a430-323833356265
DTSTAMP:20260521T062342Z
DESCRIPTION:
DTSTART:20181213T110000Z
DTEND:20181213T130000Z
SUMMARY:Paper Presentation: 2: SAT-based model-checking for security protoc
 ols analysis
END:VEVENT
BEGIN:VEVENT
UID:64633531-3066-4732-a364-613730616562
DTSTAMP:20260521T062342Z
DESCRIPTION:
DTSTART:20181220T110000Z
DTEND:20181220T130000Z
SUMMARY:Paper Presentation: 3: Automatic Verification of Security Protocols
  in the Symbolic Model: the Verifier ProVerif
END:VEVENT
BEGIN:VEVENT
UID:63663663-6432-4465-b033-326666393230
DTSTAMP:20260521T062342Z
DESCRIPTION:
DTSTART:20190110T110000Z
DTEND:20190110T130000Z
SUMMARY:Paper Presentation: 4: Secure Information Flow as a Safety Problem
END:VEVENT
BEGIN:VEVENT
UID:31363539-6437-4235-b339-383232323734
DTSTAMP:20260521T062342Z
DESCRIPTION:
DTSTART:20190117T110000Z
DTEND:20190117T130000Z
SUMMARY:Paper Presentation: 7: Automatic Discovery and Quantification of In
 formation Leaks
END:VEVENT
BEGIN:VEVENT
UID:31396137-6462-4563-b961-666166613862
DTSTAMP:20260521T062342Z
DESCRIPTION:
DTSTART:20190124T110000Z
DTEND:20190124T130000Z
SUMMARY:Paper Presentation: 8: Verifying Constant-Time Implementations
END:VEVENT
END:VCALENDAR
