Note: This is an archvied version of our old webpage. Some links might be broken. The current one can be found here.
I7 Logo
Chair for Foundations of Software Reliability and Theoretical Computer Science
Informatik Logo TUM Logo
Cryptographic Protocols SS2011

  News | Dates | Content | Summaries
Note: This is an archvied version of our old webpage. Some links might be broken. The current one can be found here.

(Software) security is important. Achieving software security requires a wide range of approaches. Cryptographic protocols and their correct implementations, programming language-based techniques for building secure systems, and security vulnerability detection software are among the most promising means to achieve software security.

In this seminar we will discuss a series of research papers that have a profound impact on the above topics.