Home |
People |
Projects |
Courses and Seminars |
Links |
A secondary focus is the sampling of the various delectable junk-food goodies indigenous to supermarkets everywhere.
10/2/2001 at 4:30pm (**Note change of date**) Bruce Kapron (visiting Stanford) on Logics for reasoning about cryptographic constructions (Joint work with Russell Impagliazzo, UCSD)
10/16/2001 at 4:30pm Scott Fluhrer of Cisco Systems on Weaknesses in the Key Scheduling Algorithm of RC4
11/13/2001 at 4:30pm (**Note change of date**) Alice Silverberg of Ohio State University on Efficient Traitor Tracing Algorithms using List Decoding
12/11/2001 at 4:30pm (**Note change of date**) Brian LaMacchia of Microsoft on The .NET Framework Security Infrastructure
2/5/2002 at 4:30pm Rafail Ostrovsky of Telcordia Technologies on Cryptographic Protocols on the Internet.
Friday 2/22/2002 at 4:30pm Victor Shoup of IBM Research on Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Monday 2/18/2002 at 4:30pm Markus Jakobsson of RSA Laboratories on Fractal Hash Sequence Representation and Traversal
Monday 3/18/2002 at 4:30pm Kevin Fu of MIT on Dos and Don'ts of Client Authentication on the Web
Tuesday 4/9/2002 at 4:30pm Mark Mitchell of CodeSourcery on QMTest: An Extensible Software Testing Tool
Tuesday 5/7 at 4:30pm Eric Rescorla on Secure Auditing for SSL Transactions
Tuesday 5/14 at 4:30pm Yvo Desmedt of Florida State University on Using economics and artificial intelligence to model threats and security in distributed computing
Tuesday 5/21 at 4:30pm David Chaum on Secret-Ballot Receipts and Transparent Integrity
Tuesday 6/4/2002 at 4:30pm Bill Yeager of Sun Microsystems on Implementing Security Solutions for Peer-to-Peer Networks
Tuesday 6/11/2002 at 4:30pm Calvin Ko of NAI labs on Specification-based Intrusion Monitoring
Wednesday 8/28/2002 at 4:00pm Moni Naor of The Weizmann Institute on P2P and Geometry: Novel Architectures for DHT's and Dynamic Quorum Systems