糖心TV

Skip to main content Skip to navigation

Data Science Events

Friday, May 04, 2018

Thu, May 03 Today Sat, May 05 Jump to any date

How do I use this calendar?

You can click on an event to display further information about it.

The toolbar above the calendar has buttons to view different events. Use the left and right arrow icons to view events in the past and future. The button inbetween returns you to today's view. The button to the right of this shows a mini-calendar to let you quickly jump to any date.

The dropdown box on the right allows you to see a different view of the calendar, such as an agenda or a termly view.

If this calendar has tags, you can use the labelled checkboxes at the top of the page to select just the tags you wish to view, and then click "Show selected". The calendar will be redisplayed with just the events related to these tags, making it easier to find what you're looking for.

 
-
Export as iCalendar
Feng Hao: Tackling real-world security problems
CS 104

Abstract: In this talk, I will present an overview of my research which has been primarily driven by tackling real-world security problems. One key motivation in my work is to design security protocols that are "self-enforcing": i.e., without depending on trusted third parties. Self-enforcing protocols are powerful building blocks in many real-world applications where completely trustworthy third parties are hard to find or simply do not exist. They also serve to illustrate an interesting perspective that certain tasks intuitively regarded as impossible in the physical world can be made possible in the digital world by the novel use of cryptography, coding and other engineering techniques. To demonstrate this, I will present two examples from my research on designing and deploying self-enforcing security protocols in key exchange and electronic voting. Future research challenges will also be presented.

Bio: Dr Feng Hao is a Reader in Security Engineering in the School of Computing, Newcastle University. He graduated with a PhD in Computer Science from the University of Cambridge in 2007. He had a total of 6 years working experience in security industry before joining Newcastle University as a lecturer in 2010, and was promoted to a reader in 2014. He is the lead designer of J-PAKE, a password-authenticated key exchange protocol, which has been used by many million users in commercial products including Firefox, Palemoon, Google Nest, ARM mbed OS, NXP IoT gateway, OpenSSL, NSS, and Bouncycastle API. As of 2018, J-PAKE has been adopted by the Thread Group as an industry standard for IoT and standardized internationally in ISO/IEC 11770-4 and RFC 8236. Besides key exchange, he led the design of DRE-i, the first end-to-end verifiable e-voting system without tallying authorities.

Placeholder

Let us know you agree to cookies