School of Computer Science Guest Lecture

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Thursday February 11, 2016 - Friday February 12, 2016
      10:00 am - 10:59 am
  • Location: College of Computing, Room Klaus 1116 West 266, Ferst Drive, Atlanta 30332
  • Phone:
  • URL: http://map.gatech.edu/
  • Email: info@iisp.gatech.edu
  • Fee(s):
    $0.00
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: Joseph Bonneau of Stanford University's Applied Crypto Group visits Georgia Tech for a guest lecture.

Full Summary: No summary paragraph submitted.

Media
  • Joseph Bonneau Joseph Bonneau
    (image/jpeg)

Guest Lecture

Joseph Bonneau

Applied Crypto Group, Stanford University

Joseph Bonneau is a postdoctoral researcher at Stanford University and a Technology Fellow at the Electronic Frontier Foundation. His research focuses on cryptography and security protocols, particularly how they interact with human and organizational behavior and economic incentives. Recently, he has focused on Bitcoin and related cryptocurrencies and secure messaging tools. He is also known for his work on passwords and web authentication. He received a Ph.D. from the University of Cambridge under the supervision of Ross Anderson and a bachelor's and master's degree from Stanford University under the supervision of Dan Boneh. Last year, he was as a Postdoctoral Fellow at The Center for Information Technology Policy, Princeton and he has previously worked at Google, Yahoo, and Cryptography Research Inc.

 

"Security By Consensus"

Abstract: Traditionally, cryptography aims to reduce security to computational assumptions: the system is secure as long as attackers can't guess a random key or solve a hard mathematical problem. Larger cryptographic systems require a more holistic approach as security often relies critically on user actions and economic incentives. I'll discuss my work on passwords, secure messaging tools and cryptocurrencies, and I'll highlight the exciting new era of building security protocols using data structures with global consensus.

Additional Information

In Campus Calendar
Yes
Groups

College of Computing, School of Computer Science, College of Computing Events, Institute for Information Security and Privacy

Invited Audience
Undergraduate students, Faculty/Staff, Public, Graduate students
Categories
Seminar/Lecture/Colloquium
Keywords
cryptography, Cybersecurity, information security
Status
  • Created By: Tara La Bouff
  • Workflow Status: Published
  • Created On: Feb 1, 2016 - 3:59pm
  • Last Updated: Apr 13, 2017 - 5:16pm