--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/Nominal/activities/tphols09/basin.html Wed Mar 30 17:27:34 2016 +0100
@@ -0,0 +1,137 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
+<html>
+<head>
+<title>TPHOLs 2009</title>
+<script src="http://maps.google.com/maps?file=api&v=2&key=ABQIAAAAPK7aMC4FDjV_GNRHDThC1BTTdYAvEcsK2WWznOVPgLglzb1KQhR1cqhbUMaTXEN7XtSXuQxbViAeQg"
+ type="text/javascript"></script>
+ <script type="text/javascript">
+
+ function initialize() {
+ if (GBrowserIsCompatible()) {
+ var map = new GMap2(document.getElementById("map_canvas"));
+ var TUM = new GLatLng(48.12954444444, 11.588652777777778);
+ map.setCenter(TUM, 0);
+ map.setMapType(G_HYBRID_MAP);
+ map.addControl(new GSmallMapControl());
+ map.addOverlay(new GMarker(TUM));
+ }
+ }
+
+ </script>
+</head>
+
+<BODY TEXT="#000000"
+ BGCOLOR="#4169E1"
+ LINK="#0000EF"
+ VLINK="#51188E"
+ ALINK="#FF0000"
+ onload="initialize()" onunload="GUnload()">
+
+<TABLE WIDTH="100%"
+ BGCOLOR="#4169E1"
+ BORDER="0"
+ FRAME="border"
+ CELLPADDING="10"
+ CELLSPACING="2"
+ RULES="all">
+
+<!-- left column -->
+<TR>
+<TD BGCOLOR="#FFFFFF"
+ WIDTH="20%"
+ VALIGN="TOP"
+ ROWSPAN="2">
+
+<p align=center>
+<a href="pictures/marienplatz.jpg">
+<img src="pictures/marienplatz_small.jpg" alt="Marienplatz" border=0></a>
+<br>
+<small>Marienplatz (city centre)</small><br>
+</p>
+
+<p align=center>
+<a href="pictures/englischer_garten.jpg">
+<img src="pictures/englischer_garten_small.jpg" alt="Englischer Garten" border=0></a>
+<br>
+<small>The English Garden</small><br>
+</p>
+
+<p align=center>
+<a href="pictures/chinesischer_turm.jpg">
+<img src="pictures/chinesischer_turm_small.jpg" alt="Chinesischer Turm" border=0></a>
+<br>
+<small>Chinese Tower (famous beer garden)</small><br>
+</p>
+
+<p align=center>
+<a href="pictures/cs_building.jpg">
+<img src="pictures/cs_building_small.jpg" alt="Computer science building" border=0></a>
+<br><small>The Computer Science building of the TUM</small><br>
+</p>
+
+<p align=center>
+<a href="pictures/magistrale.jpg">
+<img src="pictures/magistrale_small.jpg" alt="Main hall of the computer science building" border=0></a>
+<br>
+<small>The main hall in the CS-building</small><br>
+</p>
+
+<p align=center>
+<a href="pictures/isar.jpg">
+<img src="pictures/isar_small.jpg" alt="The river Isar" border=0></a>
+<br>
+<small>The Isar river</small><br>
+</p>
+
+<p align=center>
+<A HREF="pictures/tphols09_poster.jpg">
+<IMG ALT="poster" SRC="pictures/tphols09_poster_small.jpg" align="top"></A>
+<BR>
+<small>The conference poster</small><br>
+</p>
+
+</TD>
+
+
+<!-- right column -->
+<TD BGCOLOR="#FFFFFF" WIDTH="75%" VALIGN="TOP">
+<H3>SPEAKER: David Basin</H3>
+
+<H3>TITLE: Let's get physical: models and methods for real-world security
+protocols</H3>
+
+(Joint work with Patrick Schaller, Benedikt Schmidt, and Srdjan Capkun)
+
+<p>
+Traditional security protocols are mainly concerned with key establishment and
+principal authentication, and rely on predistributed keys and properties of
+cryptographic operators. In contrast, new application areas are emerging that
+establish and rely on properties of the physical world. Examples include
+secure localization, distance bounding, and device pairing protocols.
+</p>
+
+<p>
+We present a formal model extending standard, inductive, trace-based, symbolic
+approaches in two directions. In terms of communication, we refine the
+standard Dolev-Yao model to account for network topology, transmission delays,
+and node positions. This results in a distributed intruder with restricted,
+but more realistic, communication capabilities. On the level of messages, we
+use an abstract message theory to establish facts independent of the concrete
+protocol and message theory. To analyse the security of a given protocol, we
+instantiate the abstract message theory so that properties of the
+cryptographic operators under consideration are accurately modeled. We
+describe the formalization of this model in Isabelle/HOL and present its
+application to a distance bounding protocol, where the concrete message theory
+includes exclusive-or and its associated equational theory.
+</p>
+</TD>
+</TABLE>
+
+<hr>
+<!-- Created: Thu Feb 28 19:21:12 CET 2008 -->
+<!-- hhmts start -->
+Last modified: Wed Apr 29 19:18:31 CEST 2009
+<!-- hhmts end -->
+<a href="http://validator.w3.org/check/referer">[Validate this page.]</a>
+</body>
+</html>