IMDEA initiative
Abstract: Reproducibility crisis in science, including computational sciences, is a serious, well-known, and well-documented probl...
Abstract: Group signatures allow user data to be collected while preserving the user’s privacy but still ensuring it origina...
Abstract: What do Apple, the FBI and a Belgian politician have in common? In 2003, in Belgium there was an electronic election and...
Abstract: In this talk, I will make an introduction to the paradigm of Answer Set Programming (ASP) and its extension for temporal...
Abstract: This talk is scoped for both cryptographers and non-cryptographers. I will start by introducing two of the most active r...
Abstract: Malware analysis systems are one of the best weapons in the arsenal of cybersecurity companies and researchers. An integ...
Abstract: Database Management Systems (DBMS) are used ubiquitously for storing and retrieving data. It is critical that they funct...
Abstract: The POSIX shell is a widely deployed, powerful tool for managing computer systems. The shell is the expert’s control pan...
Abstract: Modern graph query engines are gaining momentum, driven by exponentially growing, interconnected data volumes that popul...
Abstract: In response to incidents of unintended disclosure and misuse of user data by online services, modern data protection reg...
Abstract: Software correctness is becoming an increasingly important concern as our society grows more and more reliant on compute...
Abstract: Fully-autonomous cyber-physical systems (CPS) such as autonomous vehicles, drones, and robots today are not engineered a...
Abstract: Traditionally, the server-side code of websites was written in languages such as PHP or Java for which security issues a...
Abstract: Blockchain technologies have rapidly acquired popularity and promise to become one of the pillars of the digital society...
Abstract: High-performance multicores providing strong consistency guarantees speculatively reorder memory operations. If a memory...
Abstract: Program synthesis is often called the “holy grail” of computer science, as it enables users to refrain from ...
Abstract: Recent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) and its applications. ...
Abstract: In secret sharing a dealer holds a secret and wants to distribute it among several parties in such a way that the indivi...
Abstract: Software is a fundamental pillar of modern scientific research, across all fields and disciplines. However, there is a g...
Abstract: The Elliptic Curve Digital Signature Algorithm (ECDSA) is a widely adopted digital signature standard; in particular it ...
Abstract: Caches have become the prime method for unintended information extraction across logical isolation boundaries. They are ...