Seminars

2013 Seminars

December

  • On Mobile Malware
    N. Asokan, Aalto University
    Dec 16 (Mon), 1:15 - 2:15 pm, DC 1302
October
  • Chasing Telephony Security: Where the Wild Things.... Are?
    Patrick Traynor, Georgia Institute of Technology
    Oct 9 (Wed), 1:30 - 2:30 pm, DC 1302
  • A Human-Centered Tool for Enhancing Patient Privacy in Electronic Medical Record Systems
    Kelly Caine, Clemson University
    Oct 21 (Mon), 4:00 - 5:00 pm, DC 2568
  • Random Projections and Differential Privacy
    Jalaj Upadhyay, University of Waterloo
    Oct 24 (Thu), 2:30 - 3:30 pm, DC 1304
  • IRMA: Attribute-Based Credentials in Practice
    Wouter Lueks, University of Nijmegen, The Netherlands
    Oct 30 (Wed), 2:30 - 3:30 pm, MC 5158
September
  • Ibis: An Overlay Mix Network for Microblogging
    Ian Goldberg, University of Waterloo
    Sep 12 (Thu), 2:30 - 3:30 pm, DC 1304
August
  • Modeling and Design of Proactive Network Defense
    Radha Poovendran, University of Washington
    Aug 1 (Thu), 3:00 - 4:00 pm, EIT 1015
  • Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control
    Nima Mousave, University of Waterloo
    Aug 27 (Tue), 2:00 - 3:00 pm, EIT 3142
July
  • Security Issues in Wireless Sensor Networks
    Kevin Henry, University of Waterloo
    July 3 (Wed), 10:30 - 11:30 am, DC 1304
  • Is Extracting Data the Same as Possessing Data?
    Jalaj Upadhyay, University of Waterloo
    July 19 (Fri), 10:00 - 11:00 am, DC 1331
  • Crypto Standards, Research and Applications
    Lily Chen, NIST
    July 26 (Fri), 2:00 - 3:00 pm, DC 1302
  • Improved Website Fingerprinting for Tor
    Tao Wang, University of Waterloo
    July 31 (Wed), 10:30 - 11:30 am, DC 1331
June
  • Least-Restrictive Enforcement of the Chinese Wall Security Policy
    Alireza Sharifi, University of Waterloo
    June 5 (Wed), 3:00 - 4:00 pm, E5 4106-4128
  • Privacy-Centric Access Control for Distributed Heterogeneous Medical Information Systems
    Atif Khan, University of Waterloo
    June 10 (Mon), 10:00 - 11:00 am, DC 1304
  • Satisfiability and Feasibility in a Relationship-based Workflow Authorization Model
    Philip Fong, University of Calgary
    June 24 (Mon), 11:30 - 12:30 pm, QNC 1502
  • Security of Quantum Communication Networks: Beyond QKD
    Rolando Somma, Los Alamos National Laboratory
    June 24 (Mon), 2:30 - 3:30 pm, QNC 0101
  • Cars, Condoms, and the Privacy Paradox: A Case Study with Facebook
    Vaibhav Garg, Drexel University
    June 26 (Wed), 3:30 - 4:30 pm, DC 1304
May
  • The Rank Method and Applications to Post-Quantum Cryptography
    Mark Zhandry, Stanford University
    May 6 (Mon), 2:30 - 3:30 pm, QNC 0101
  • Group-Theoretic Cryptography
    Spyros Magliveras, Florida Atlantic University
    May 13 (Mon), 1:30 - 2:30 pm, MC 5158
  • Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences
    Kalikinkar Mandal, University of Waterloo
    May 21 (Tue), 11:00 - 12:00 pm, EIT 3142
  • Generating Safe Primes and Safe Moduli
    Joachin von zur Gathen, University of Bonn
    May 31 (Fri), 11:00 - 11:50 am, DC 1302
April
  • Censorship Resistance on the Internet: Strategies and Techniques for Free and Open Communication
    Tariq Elahi, University of Waterloo
    Apr 2 (Tue), 1:30 - 2:30 pm, DC 1331
  • Catalyzing Social Change as a Privacy and Security Technologist
    Michael Brennan, SecondMuse
    Apr 3 (Wed), 3:30 - 4:30 pm, DC 1302
  • Two Tales of Privacy in Online Social Networks
    Claudia Diaz, KU Leuven
    Apr 5 (Fri), 11:00 am - 12:00 pm, DC 1304
  • How to Misuse, Use, and Mitigate Side Channels in Virtualized Environments
    Michael Reiter, University of North Carolina
    Apr 16 (Tue), 2:30 pm - 3:30 pm, DC 1304
  • Towards Practical Fully Homomorphic Encryption Schemes
    Berk Sunar, Worcester Polytechnic Institute
    Apr 19 (Fri), 2:00 pm - 3:00 pm, E5 5106-5128
March
  • DefenestraTor: Throwing Out Windows in Tor
    Mashael Alsabah, University of Waterloo
    Mar 5 (Tue), 1:30 - 2:30 pm, DC 1331
  • Leveraging 3D Integrated Circuit Manufacturing Technology to Enhance the Security of Computer Hardware
    Frank Imeson, University of Waterloo
    Mar 14 (Thu), 2:00 - 3:00 pm, EIT 3145
  • Privacy in Emerging Technologies: Challenges, Attacks, and Defenses
    Dawn Song, UC Berkeley
    Mar 14 (Thu), 3:30 - 4:30 pm, DC 1302
  • Quantum Circuits for Point Addition on Binary Elliptic Curves
    Rainer Steinwandt, University of Waterloo
    Mar 18 (Mon), 2:30 - 3:30 pm, QNC 1103
  • On Quadratic Almost Perfect Nonlinear Functions and Their Related Algebraic Object
    Yin Tan, University of Waterloo
    Mar 27 (Wed), 1:30 - 2:30 pm, EIT 3145
February
  • PCTCP: Per-Circuit TCP-over-IPSec Transport for Anonymous Communication Overlay Networks
    Mashael Alsabah, University of Waterloo
    Feb 14 (Thu), 1:30 - 2:30 pm, DC 1331
  • Cryptography in a Quantum World
    Fang Song, Penn State University
    Feb 6 (Wed), 2:00 - 3:00 pm, QNC 1103b
January
  • Weapons of the Geek
    Gabriella Coleman, McGill University
    Jan 28 (Mon), 4:30 - 5:30 pm, DC 1302