Home |
People |
Projects |
Courses and Seminars |
Links |
A secondary focus is the sampling of the various delectable junk-food goodies indigenous to supermarkets everywhere.
Tuesday 06/22/2004 at 4:30pm.
Michael Backes of IBM Zurich Research Lab
A Composable Dolev-Yao-Style Cryptographic Library With Nested
Operations
Tuesday 08/03/2004 at 4:30pm.
Ralf Kuesters, University of Kiel
Sequential Probabilistic Process Calculus and Simulation-based
Security
Friday 08/13/2004 at 3:00pm.
Rebecca Wright, Stevens Institute of Technology
Privacy-Preserving Bayesian Network Structure Computation on
Distributed Heterogeneous Data
Thursday 09/16/2004 at 4:30pm.
Gal Badishi of the Technion
Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in
Secure Gossip-Based Multicast
Tuesday 11/02/2004 at 4:30pm.
Christian Collberg of the University of Arizona
Software Watermarking: State of the Art and Future Directions
Tuesday 11/09/2004 at 4:30pm.
Andy Neff of VoteHere
Trustworthy Electronic Election Results without Trusted Machines
Thursday 12/02/2004 at 4:30pm.
David Molnar of Berkeley
Privacy and Security in Library RFID
Tuesday 02/01/2005 at 4:30pm.
Dahlia Malkhi of Hebrew University and Microsoft Research
FairPlay: A Secure Two-Party Computation System
Friday 03/04/2005 at 4:30pm.
Ramarathnam Venkatesan of Microsoft Research
Towards Randomized Signal Processing: The Randlet transform and
Image Identification
Tuesday 03/08/2005 at 4:30pm.
Dawn Song of Carnegie Mellon University
Sting: an Automatic Defense System against Zero-day Exploits
Thursday 03/10/2005 at 4:30pm.
Lea Kissner of Carnegie Mellon University
Privacy-Preserving Set Operations
Tuesday 03/15/2005 at 4:30pm.
Gary McGraw of Cigital
Exploiting Software: How to Break Code
Tuesday 03/29/2005 at 4:30pm.
Anna Lysyanskaya of Brown University
Compact E-Cash
Tuesday 04/05/2005 at 4:30pm.
Brian Hernacki of Symantec
An Examination of Emerging Threats
Thursday 04/07/2005 at 4:30pm.
Matthias Jacob of Princeton University
STONe: Secure Trusted Overlay Networks for Certified Anonymous Communication
Thursday 06/16/2005 at 4:30pm.
Benny Applebaum of Technion
Cryptography in Constant Parallel Time
Friday 07/15/2005 at 4:30pm.
Eran Tromer of the Weizmann
Reflective side-channel cryptanalysis