Events Search and Views Navigation
February 2019
March 2019
Demystifying Blockchains: Decentralized and Fault-tolerant Storage for the Future of Big Data?
Abstract >>> Bitcoin is a successful and interesting example of a global scale >>> peer-to-peer cryptocurrency that integrates many techniques and >>> protocols from cryptography, distributed systems, and databases. The >>> main underlying data platform is a blockchain, a scalable fully >>> replicated structure that is shared among all participants and >>> guarantees a consistent view of all user transactions by all >>> participants in the cryptocurrency system. The novel aspect of >>> Blockchain is that historical data about currency…
Find out more »Friend or Foe? Security and Privacy Pitfalls in the Internet-of-Things Era
Speaker: Murtuza Jadliwala, University of Texas at San Antonio Venue: Room 109, new CSE/CC building Date: March 11, 2019 Time: 11:00 – 12:00 Abstract: In this era of Internet-of-Things (IoT), new devices are becoming cyber-enabled at an extraordinary pace, many of which have traditionally never had a cyber-interface before. These devices are equipped with high-precision sensing capabilities that can capture fine-grained contextual information about end-users and their environment and can support a variety of novel context- and activity-based applications. However,…
Find out more »May 2019
Dictionary Attacks on Biometric Systems
ABSTRACT: Contrary to the prevailing belief, we show that user authentication based on biometrics is vulnerable to dictionary attacks. We show the problem is particularly significant for partial prints used in smartphones and increasingly adopted for authentication tasks ranging from unlocking the devices screen up to payment authorization. We also show that speaker verification systems are also vulnerable to dictionary attacks. We then discuss ways to mitigate such attacks. ABOUT THE SPEAKER: Nasir Memon is a professor in the Department…
Find out more »June 2019
Basic Course on Cyber security
Basic Course on Cybersecurity Information Security Research & Development Center Department of Computer Science and Engineering IIT Bombay Time Topic Details 09:00 - 09:30 Registration -- 09:30 - 10:30 Introduction Information Systems Security principles Confidentiality vs Privacy Access control - why do we need models/frameworks? Management of Information Systems (MIS) Compliance: assess - remediate - report 10:30 - 11:30 Security Cloud computing, Fog computing, IoT Cybersecurity, cyber physical security, WiFi security, IT infrastructure security Identity theft, safe browsing, safe configurations…
Find out more »July 2019
Blockchain for Business
Abstract: “What internet did with information, blockchain will do the same with transactions”. Blockchain is a transformational technology for businesses as it drives re-imagination of processes and business models in a distributed and decentralized manner. Many business executives either do not have the true insights about the blockchain technology and its potential usage and value for their business and industry or they have misconception about it due to its origin from bitcoin and cryptocurrency. Let’s hear and discuss with Jai…
Find out more »