[TYPES] Third Stevens Cybersecurity Symposium, March 26

Dominic Duggan dduggan at cs.stevens-tech.edu
Sun Feb 8 09:26:22 EST 2004


(At least two of the talks involve types...)


                   Third Stevens Symposium on
             Cybersecurity and Trustworthy Software
 
                    Friday, March 26, 2004
                Stevens Institute of Technology
                    Hoboken, New Jersey, USA
 
Symposium web site: http://www.njites.org/Symposium/
 
E-mail inquiries: njites-symposium at cs.stevens-tech.edu

Register for future announcements: 
http://guinness.cs.stevens-tech.edu/mailman/listinfo/njites-announce
 
This symposium brings together researchers and practitioners, in
government, academia and industry, to discuss problems and possible
solutions in cyber security, both for e-commerce and for homeland
security. A particular emphasis of the symposium is to bring together
those interested in communications security and in end-to-end security.
 
 
8:30-9:15 Registration and breakfast
 
9:15 Opening remarks
 
9:30-10:30 Keynote talk: Cybersecurity and Its Limitations. 
       Andrew Odlyzko, University of Minnesota Digital Technology Center.
 
10:30-11:00 Coffee break.
 
11:00-11:30 Privacy without Cryptography. 
       Ari Juels, RSA Laboratories.
 
11:30-12:00 ISO Standardization of Public Key Encryption.  
       Victor Shoup, New York University.
 
12:00-2:00 Lunch.
 
2:00-3:00 Keynote talk: Can we make legacy code type safe?  
       Greg Morrisett, Harvard University.
 
3:00-3:30 Coffee break.
 
3:30-4:00 Security Protocol Analysis and Wireless Security.  
       Catherine Meadows, Naval Research Laboratory.
 
4:00-4:30 After the buffer overflows are all patched: 
       Pre-deployment verification of behavioral contracts.  
       David Naumann, Stevens Institute of Technology.
 
4:30 Concluding remarks.
 
 


More information about the Types-list mailing list