Courses and Seminars
Stanford Security Seminar


The focus of the Stanford Security Seminar is on communication between Stanford and the outside world on any and all topics pertaining to computer security.  Typically, a speaker from industry or elsewhere in academia presents their current work in an informal setting on the Stanford campus. These symposia are open to the public and are generally accessible and interesting to experts and laypeople alike.

A secondary focus is the sampling of the various delectable junk-food goodies indigenous to supermarkets everywhere.

Mailing List

There is a mailing list on which announcements of upcoming seminars are posted, and which may be used for discussion of the seminars either before or after they occur.  The address of the list itself is  security-seminar@lists.stanford.eduAnyone may join the list by sending a message to  majordomo@lists.stanford.edu  with "subscribe security-seminar" in the body of the message.

Time and Place

Seminars occur on approximately alternate Tuesdays at 4:30 PM in the 4B center area (opposite office 490) of the Gates building at Stanford University.  For various maps showing both how to reach the campus and how to find the Gates building, see  http://www.stanford.edu/home/visitors/maps.html


Tuesday 06/22/2004 at 4:30pm.
Michael Backes of IBM Zurich Research Lab
A Composable Dolev-Yao-Style Cryptographic Library With Nested Operations

Tuesday 08/03/2004 at 4:30pm.
Ralf Kuesters, University of Kiel
Sequential Probabilistic Process Calculus and Simulation-based Security

Friday 08/13/2004 at 3:00pm.
Rebecca Wright, Stevens Institute of Technology
Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data

Thursday 09/16/2004 at 4:30pm.
Gal Badishi of the Technion Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast

Tuesday 11/02/2004 at 4:30pm.
Christian Collberg of the University of Arizona
Software Watermarking: State of the Art and Future Directions

Tuesday 11/09/2004 at 4:30pm.
Andy Neff of VoteHere
Trustworthy Electronic Election Results without Trusted Machines

Thursday 12/02/2004 at 4:30pm.
David Molnar of Berkeley
Privacy and Security in Library RFID

Tuesday 02/01/2005 at 4:30pm.
Dahlia Malkhi of Hebrew University and Microsoft Research
FairPlay: A Secure Two-Party Computation System

Friday 03/04/2005 at 4:30pm.
Ramarathnam Venkatesan of Microsoft Research
Towards Randomized Signal Processing: The Randlet transform and Image Identification

Tuesday 03/08/2005 at 4:30pm.
Dawn Song of Carnegie Mellon University
Sting: an Automatic Defense System against Zero-day Exploits

Thursday 03/10/2005 at 4:30pm.
Lea Kissner of Carnegie Mellon University
Privacy-Preserving Set Operations

Tuesday 03/15/2005 at 4:30pm.
Gary McGraw of Cigital
Exploiting Software: How to Break Code

Tuesday 03/29/2005 at 4:30pm.
Anna Lysyanskaya of Brown University
Compact E-Cash

Tuesday 04/05/2005 at 4:30pm.
Brian Hernacki of Symantec
An Examination of Emerging Threats

Thursday 04/07/2005 at 4:30pm.
Matthias Jacob of Princeton University
STONe: Secure Trusted Overlay Networks for Certified Anonymous Communication

Thursday 06/16/2005 at 4:30pm.
Benny Applebaum of Technion
Cryptography in Constant Parallel Time

Friday 07/15/2005 at 4:30pm.
Eran Tromer of the Weizmann
Reflective side-channel cryptanalysis

For comments on this page, or for more information, send email to the list administrator at owner-security-seminar@lists.stanford.edu.