[TYPES] Third Stevens Cybersecurity Symposium, March 26
Dominic Duggan
dduggan at cs.stevens-tech.edu
Sun Feb 8 09:26:22 EST 2004
(At least two of the talks involve types...)
Third Stevens Symposium on
Cybersecurity and Trustworthy Software
Friday, March 26, 2004
Stevens Institute of Technology
Hoboken, New Jersey, USA
Symposium web site: http://www.njites.org/Symposium/
E-mail inquiries: njites-symposium at cs.stevens-tech.edu
Register for future announcements:
http://guinness.cs.stevens-tech.edu/mailman/listinfo/njites-announce
This symposium brings together researchers and practitioners, in
government, academia and industry, to discuss problems and possible
solutions in cyber security, both for e-commerce and for homeland
security. A particular emphasis of the symposium is to bring together
those interested in communications security and in end-to-end security.
8:30-9:15 Registration and breakfast
9:15 Opening remarks
9:30-10:30 Keynote talk: Cybersecurity and Its Limitations.
Andrew Odlyzko, University of Minnesota Digital Technology Center.
10:30-11:00 Coffee break.
11:00-11:30 Privacy without Cryptography.
Ari Juels, RSA Laboratories.
11:30-12:00 ISO Standardization of Public Key Encryption.
Victor Shoup, New York University.
12:00-2:00 Lunch.
2:00-3:00 Keynote talk: Can we make legacy code type safe?
Greg Morrisett, Harvard University.
3:00-3:30 Coffee break.
3:30-4:00 Security Protocol Analysis and Wireless Security.
Catherine Meadows, Naval Research Laboratory.
4:00-4:30 After the buffer overflows are all patched:
Pre-deployment verification of behavioral contracts.
David Naumann, Stevens Institute of Technology.
4:30 Concluding remarks.
More information about the Types-list
mailing list