BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:32373463-6537-4363-b262-316264373563
X-WR-CALNAME:Selected Topics in Formal Methods for Security Calendar
X-WR-CALDESC:Events of the lecture Selected Topics in Formal Methods for Se
 curity
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:66353037-3331-4366-b132-343832343634
DTSTAMP:20260521T035104Z
DESCRIPTION:
DTSTART:20181108T111500Z
DTEND:20181108T130000Z
SUMMARY:Fmsem: Reading Group
END:VEVENT
BEGIN:VEVENT
UID:30386631-6134-4137-b730-663733316537
DTSTAMP:20260521T035104Z
DESCRIPTION:
DTSTART:20181122T111500Z
DTEND:20181122T130000Z
SUMMARY:Fmsem: Reading Group
END:VEVENT
BEGIN:VEVENT
UID:39396165-6239-4266-a466-633536346365
DTSTAMP:20260521T035104Z
DESCRIPTION:
DTSTART:20181213T110000Z
DTEND:20181213T130000Z
SUMMARY:Fmsem: Paper Presentation: 2: SAT-based model-checking for security
  protocols analysis
END:VEVENT
BEGIN:VEVENT
UID:33616237-6434-4431-a439-366566316266
DTSTAMP:20260521T035104Z
DESCRIPTION:
DTSTART:20181220T110000Z
DTEND:20181220T130000Z
SUMMARY:Fmsem: Paper Presentation: 3: Automatic Verification of Security Pr
 otocols in the Symbolic Model: the Verifier ProVerif
END:VEVENT
BEGIN:VEVENT
UID:37626134-3634-4034-b633-663963663232
DTSTAMP:20260521T035104Z
DESCRIPTION:
DTSTART:20190110T110000Z
DTEND:20190110T130000Z
SUMMARY:Fmsem: Paper Presentation: 4: Secure Information Flow as a Safety P
 roblem
END:VEVENT
BEGIN:VEVENT
UID:33373566-6331-4530-a263-663963613861
DTSTAMP:20260521T035104Z
DESCRIPTION:
DTSTART:20190117T110000Z
DTEND:20190117T130000Z
SUMMARY:Fmsem: Paper Presentation: 7: Automatic Discovery and Quantificatio
 n of Information Leaks
END:VEVENT
BEGIN:VEVENT
UID:35316662-3130-4238-a361-613638363532
DTSTAMP:20260521T035104Z
DESCRIPTION:
DTSTART:20190124T110000Z
DTEND:20190124T130000Z
SUMMARY:Fmsem: Paper Presentation: 8: Verifying Constant-Time Implementatio
 ns
END:VEVENT
END:VCALENDAR
