Mprime Speaker Series on Privacy
Upcoming speakers
- TBA: Patrick Traynor, Georgia Institute of Technology
- To be held at the University of Waterloo.
Abstract: TBA
Bio: TBA
- Philippe Golle, Xerox Palo Alto Research Center
- To be held at the University of Calgary.
Abstract: TBA
Bio: TBA
- Prof. Elisa Bertino, Purdue University
- To be held at the University of Calgary.
Abstract: TBA
Bio: Professor Elisa Bertino joined Purdue in January 2004 as professor in Computer Science and research director at CERIAS. Her research interests cover many areas in the fields of information security and database systems. Her research combines both theoretical and practical aspects, addressing applications on a number of domains, such as medicine and humanities. Current research includes: access control systems, secure publishing techniques and secure broadcast for XML data; advanced RBAC models and foundations of access control models; trust negotiation languages and privacy; data mining and security; multi-strategy filtering systems for Web pages and sites; security for grid computing systems; integration of virtual reality techniques and databases; and geographical information systems and spatial databases.
Professor Bertino serves on the editorial boards of several journals - many of which are related to security, such as the ACM Transactions on Information and System Security, the IEEE Security & Privacy Magazine, and IEEE Transactions on Dependable and Secure Computing. She served as program chair of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT02), and as program chair of the 9th International Conference on Extending Database Technology Conference (EDBT 2004). Professor Bertino is a Fellow of the Institute of Electrical and Electronics Engineers and a Fellow of ACM, and received the IEEE Computer Society Technical Achievement award in 2002 for outstanding contributions to database systems and database security and advanced data management systems. She recently received the received the 2005 Tsutomu Kanai Award by the IEEE Computer Society for pioneering and innovative research contributions to secure distributed systems.
Past speakers
- 19 Jan 2012 @ University of Waterloo: Sonia Chiasson, Carleton University
- "The convergence of human factors and computer security"
- 12 Dec 2011 @ University of Waterloo: Nadia Heninger, UC San Diego
- "Approximate common divisors via lattices"
- 14 Nov 2011 @ University of Waterloo: Eugene Vasserman, Kansas State University
- "Censorship Resistant Overlay Publishing"
- 21 Nov 2011 @ University of Waterloo: Vinod Vaikuntanathan, University of Toronto
- "Computing Blindfolded: New Developments in Fully Homomorphic Encryption"
- 24 October 2011 @ University of Waterloo: Kevin Bauer, University of Waterloo
- "Improving Security and Performance in Low-Latency Anonymity Networks"
- 7 September 2011 @ University of Waterloo: Tamir Tassa, The Open University of Israel
- "Generalized Oblivious Transfer by Secret Sharing"
- 8 August 2011 @ University of Waterloo: Ahmad-Reza Sadeghi, Technical University Darmstadt
- "Cloudy and Phony: On the Convergence of Cloud and Smartphone Security"
- 26 July 2011 @ University of Waterloo: Jean-Pierre Hubaux, EPFL
- "Two Short Talks about the Security of Web Applications"
- 28 May 2011 @ University of Waterloo: Ryan Henry, University of Waterloo
- "Formalizing and Extending Anonymous Blacklisting Systems"
- 1 April 2011 @ University of Waterloo: Matthew Wright, University of Texas at Arlington
- "Removing Detectable Statistics from Covert Channels"
- 11 March 2011 @ University of Waterloo: Prateek Mittal, University of Illinois, Urbana-Champaign
- "Throughput Fingerprinting-based Traffic Analysis of Low Latency Anonymous Communication"
- 8 Mar 2011 @ University of Waterloo: Mohammad Hossein Manshaei, EPFL
- "Game Theory Meets Network Security and Privacy"
- 15 Dec 2010 @ University of Waterloo: Femi Olumofin, University of Waterloo
- "Preserving Access Privacy Over Large Databases"
- 10 Dec 2010 @ University of Waterloo: Aleksander Essex, University of Waterloo
- "Eperio: Mitigating Technical Complexity in Cryptographic Election Verificaiton"
- 9 Dec 2010 @ University of Waterloo: Ryan Henry, University of Waterloo
- "Nymbler: Privacy-enhanced Protection from Abuses of Anonymity"
- 3 Dec 2010 @ University of Waterloo: Jeremy Clark, University of Waterloo
- "Selections: An Internet Voting System with Over-the-shoulder Coercion Resistance"
- 1 Dec 2010 @ University of Waterloo: Femi Olumofin, University of Waterloo
- "Revisiting the Computational Practicality of Private Information Retrieval"
- 26 Nov 2010 @ University of Waterloo: Aleksander Essex, University of Waterloo
- "Hacking Democracy: An Election Fraudster's Tricks of the Trade"
- 12 Nov 2010 @ University of Waterloo: Stacey Jeffery, University of Waterloo
- "Dealing with Ghosts: Trading Robustness for Correctness and Privacy in Certain Multiparty Functions, Beyond an Honest Majority"
- 22 October 2010 @ University of Waterloo: Kevin Bauer, University of Colorado
- "Toward Improving Tor's Security and Performance"
- 24 September 2010 @ University of Waterloo: Alessandro Acquisti, Carnegie Mellon University
- "Privacy, Behavioral Economics, and the Control Paradox"
- 9 Sep 2010 @ University of Waterloo: Christian Henrich, Karlsruhe Institute of Technology
- "Bingo Voting — Verifiable Voting Scheme Based on a Trusted Random Number Generator"
- 26 July 2010 @ University of Waterloo: Maura Paterson, Birkbeck, University of London
- "Distinct-difference configurations: multihop paths and key predistribution in sensor networks"
- 14 July 2010 @ University of Waterloo: Atefeh Mashatan, EPFL
- "A Message Recognition Protocol Based on Standard Assumptions"
- 12 July 2010 @ University of Waterloo: Tara Whalen, Office of the Privacy Commissioner of Canada
- "Technology and Privacy: A Short Tour through an Emerging Landscape"
A video of the talk is available.
- 8 July 2010 @ University of Waterloo: Greg Zaverucha, University of Waterloo
- "Constant-Size Commitments to Polynomials and Their Applications"
- 5 July 2010 @ University of Waterloo: Qi Xie, University of Waterloo
- "Privacy-Preserving Interest Matching for Mobile Social Networking"
- 25 June 2010 @ University of Waterloo: Michael Reiter, University of North Carolina
- "Defending Against Client Compromises in Client-Server Applications"
- 21 Jun 2010 @ University of Waterloo: Can Tang, University of Waterloo
- "An Improved Algorithm for Tor Circuit Scheduling"
- 27 May 2010 @ University of Waterloo: Aniket Kate, University of Waterloo
- "Distributed Private-Key Generators for Identity-Based Cryptography"
- 11 May 2010 @ University of Waterloo: Roger Dingledine, The Tor Project
- "Tor and censorship: lessons learned"
- 7 May 2010 @ University of Waterloo: Rachel Greenstadt, Drexel University
- "Privacy & Stylometry: Exploring the Limitations and Potential of Automated Authorship Recognition"
- 19 March 2010 @ University of Waterloo: Rosario Gennaro, IBM Research
- "Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers"
- 9 March 2010 @ University of Waterloo: Tadayoshi Kohno, University of Washington
- "Increasing Privacy with Self-destructing Data"
- 5 March 2010 @ University of Waterloo: Wanying Luo, University of Waterloo
- "Designing a Privacy-Aware Location Proof Architecture"
- 5 February 2010 @ University of Waterloo: Jeremy Clark, University of Waterloo
- "The First Governmental Election with a Voter Verifiable Tally: Experiences using Scantegrity II at Takoma Park"
- 15 January 2010 @ University of Waterloo: Nick Hopper, University of Minnesota
- "Scalable Anonymous Overlay Networks"
- 14 January 2010 @ University of Waterloo: Aniket Kate, University of Waterloo
- "Using Sphinx to Improve Onion Routing Circuit Construction"
- 3 December 2009 @ University of Waterloo: Sherman Chow, New York University
- "Improving Privacy and Security in Multi-Authority Attribute-Based Encryption"
- 1 December 2009 @ University of Waterloo: Periklis Papakonstantinou, University of Toronto
- "On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations"
- 29 October 2009 @ University of Waterloo: Berkant Ustaoğlu, NTT Information Sharing Platform Laboratories
- "Multi-party Off-the-Record Messaging"
- 15 October 2009 @ University of Waterloo: Greg Zaveruca, University of Waterloo
- "The Identity Mixer Anonymous Credential System"
- 1 October 2009 @ University of Waterloo: Jason Hinek, University of Calgary
- "Towards Attribute-Based Encryption Without Key Delegation"
- 22 July 2009 @ University of Waterloo: Ian Goldberg, University of Waterloo
- "Sphinx: A Compact and Provably Secure Mix Format"
- 15 June 2009 @ University of Waterloo: Aniket Kate, University of Waterloo
- "Distributed Key Generation for the Internet"
- 27 May 2009 @ University of Waterloo: Aniket Kate, University of Waterloo
- "Anonymous Key Agreement in an Identity-Based Infrastructure"
- 8 May 2009 @ University of Waterloo: Prof. Nikita Borisov, University of Illinois, Urbana-Champaign
- "Peer-to-peer Anonymous Communication: Approaches and Pitfalls"
- 30 March 2009 @ University of Waterloo: Chris Alexander, University of Waterloo
- "Plinko: Polling with a Physical Implementation of a Noisy Channel"
- 6 March 2009 @ University of Calgary: Richard Ford, Florida Institute of Technology
- "Biologically-Inspired Security for MANETs"
- 23 February 2009 @ University of Waterloo: Jennifer Granick, Electronic Frontier Foundation
- "Cutting Edge Cases in Digital Privacy and Crime"
- 18 February 2009 @ University of Waterloo: Greg Zaverucha, University of Waterloo
- "Private Intersection of Certified Sets"
- 11 November 2008 @ University of Waterloo: Atefeh Mashatan, University of Waterloo
- "Message recognition protocols for ad hoc networks"
- 17 October 2008 @ University of Calgary: Gene Tsudik, University of California, Irvine
- "Anonymous Mobility in Suspicious MANETs"
- 29 September 2008 @ University of Waterloo: Ontario Information and Privacy Commissioner Ann Cavoukian
- "Change the Paradigm: Embed Privacy into Technology and Ride the Next Wave"
A video of the talk is available.
- 18 September 2008 @ University of Waterloo: Joel Reardon, University of Waterloo
- "Improving Tor using a TCP-over-DTLS tunnel"
- 19 August, 2008 @ University of Waterloo: Kevin Henry, University of Waterloo
- "The theory and applications of homomorphic cryptography"
- 16 July 2008 @ University of Waterloo: Ge Zhong, University of Waterloo
- "Distributed approaches for location privacy"
- 9 July 2008 @ University of Waterloo: Ryan Stedman, University of Waterloo
- "A user study of Off-the-Record Messaging"
- 2 July 2008 @ University of Waterloo: Maura Paterson, Royal Holloway, University of London
- "Aspects of key management in wireless sensor networks"
- 9 June 2008 @ University of Waterloo: Chengxi Zhang, University of Waterloo
- "On achieving security and privacy preservation for vehicular communications"
- 23 May 2008 @ University of Calgary: Martin Gagne, University of California, Davis
- "Content-Driven Access Control Systems"
- 22 May 2008 @ University of Calgary: Yvo Desmedt, University College London, UK.
- "k-Connected Graphs, their Generalizations and Applications to Privacy and Reliability in Point-To-Point Networks"
- 16 May 2008 @ University of Calgary: Yvo Desmedt, University College London, UK.
- "Applying Recreational Mathematics to Secure Multiparty Computation"
- 1 May 2008 @ University of Calgary: Peter Wild, Royal Holloway, University of London, UK
- "Anonymous Membership Broadcast Schemes"
- 8 April 2008 @ University of Waterloo: Stefan Saroiu, University of Toronto
- "Towards eradicating phishing attacks"