BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:39613835-6530-4631-b435-626538376430
X-WR-CALNAME:Selected Topics in Formal Methods for Security Calendar
X-WR-CALDESC:Events of the lecture Selected Topics in Formal Methods for Se
 curity
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:38616539-3932-4261-a665-636532326134
DTSTAMP:20260423T034028Z
DESCRIPTION:
DTSTART:20181108T111500Z
DTEND:20181108T130000Z
SUMMARY:Fmsem: Reading Group
END:VEVENT
BEGIN:VEVENT
UID:65303465-6561-4338-b262-333937626331
DTSTAMP:20260423T034028Z
DESCRIPTION:
DTSTART:20181122T111500Z
DTEND:20181122T130000Z
SUMMARY:Fmsem: Reading Group
END:VEVENT
BEGIN:VEVENT
UID:63663837-3334-4335-b538-316535396534
DTSTAMP:20260423T034028Z
DESCRIPTION:
DTSTART:20181213T110000Z
DTEND:20181213T130000Z
SUMMARY:Fmsem: Paper Presentation: 2: SAT-based model-checking for security
  protocols analysis
END:VEVENT
BEGIN:VEVENT
UID:65613935-3939-4563-b431-373064396161
DTSTAMP:20260423T034028Z
DESCRIPTION:
DTSTART:20181220T110000Z
DTEND:20181220T130000Z
SUMMARY:Fmsem: Paper Presentation: 3: Automatic Verification of Security Pr
 otocols in the Symbolic Model: the Verifier ProVerif
END:VEVENT
BEGIN:VEVENT
UID:62653564-3332-4236-b133-663565306437
DTSTAMP:20260423T034028Z
DESCRIPTION:
DTSTART:20190110T110000Z
DTEND:20190110T130000Z
SUMMARY:Fmsem: Paper Presentation: 4: Secure Information Flow as a Safety P
 roblem
END:VEVENT
BEGIN:VEVENT
UID:38363261-3365-4033-a536-366534363661
DTSTAMP:20260423T034028Z
DESCRIPTION:
DTSTART:20190117T110000Z
DTEND:20190117T130000Z
SUMMARY:Fmsem: Paper Presentation: 7: Automatic Discovery and Quantificatio
 n of Information Leaks
END:VEVENT
BEGIN:VEVENT
UID:38643931-6139-4135-a561-613636373862
DTSTAMP:20260423T034028Z
DESCRIPTION:
DTSTART:20190124T110000Z
DTEND:20190124T130000Z
SUMMARY:Fmsem: Paper Presentation: 8: Verifying Constant-Time Implementatio
 ns
END:VEVENT
END:VCALENDAR
