Archives : Events
-
Events
Research Colloquium – Analysis and design of privacy-enhancing systems: the case of Facebook and car sharing
En savoir plusThe advancement of communication technologies such as the Internet, mobile communications, wireless networks and online platforms has eased the exchange of information between individuals: it has enabled collection of large amounts of personal data at an ever-increasing rate. In this talk we focus on two use cases: the interdependent privacy on Facebook and the privacy…
-
Events
Research Seminar – Sony 5G use cases and key technologies
En savoir plusThis talk will present the Sony view on 5G use cases and the specific technology areas related to the use cases. In particular it will describe 5G mmWave new radio, massive MIMO, massive Machine Type Communication domains and Sony contributions to 5G standardisation. Highlights from prototyping concepts and demos shown at the latest Mobile World…
-
Events
PhD Defense: Study on the structural properties of composite joints
En savoir plusPhD Supervisor: ODENBREIT Christoph
-
Events
Interdisciplinary Perspectives on the Court of Justice of the European Union
En savoir plusSemiar series 2/4 – EU Constitutionalisam Revisited: Redressing a Central Assumption in European StudiesSpeaker: Morten Rasmussen (University of Copenhagen)Discussant: Christian Pennera, Special Advisor – EU Commission. Former Jurisconsult of the European Parliament.Moderator: Prof. Robert Harmsen, University of Luxembourg
-
-
Events
SRM Research Seminar: How to model (e-voting) protocols in Tamarin
En savoir plusThe Tamarin prover is a tool for the symbolic modeling and analysis of security protocols. It takes as input a protocol model, a specification of the adversary, and a specification of the protocol’s desired properties. Tamarin can then be used to automatically check if the protocol fulfills the properties, given that arbitrarily many instances of…
-
Events
Research Seminar: Quantum security with optical PUFs
En savoir plusThe combination of optical PUFs and quantum optics makes it possible to build protocols whose security relies on physical assumptions, e.g. the assumption that it is difficult to losslessly emulate a PUF’s behaviour. QSA (Quantum Secure Authentication) is an example of such a protocol. Unfortunately, QSA requires a two-way quantum channel.
-
Events
PhD Defense: Spectrum Monitoring Algorithms for Wireless and Satellite Communications
En savoir plusPhD Supervisor: CHATZINOTAS Symeon
-
Events
PhD Defense: Colonization, succession and evolution of the human gastrointestinal microbiome in infants at high risk of metabolic disease in adulthood
En savoir plusPhD Supervisor: WILMES Paul