Security and Privacy

Available Speakers on this Topic

Haider Abbas – Islamabad, Pakistan

Rizwan Ahmed – Nagpur, India


Salman A Baset – New York, NY, United States

  • Blockchain and GDPR
    The European Union’s ("EU") General Data Protection Regulation ("GDPR"), which went into effect on 25 May 2018, is the most significant overhaul of EU data...
  • Container Security
    Whether you are an operator looking to provide a container platform for your customers or whether you are building applications using containers, the question of container security must be on your...
  • Hyperledger Fabric
    Hyperledger Fabric is an open source project under Linux Foundation, which can be used to build a permissioned blockchain. This talk will give an overview of Hyperledger Fabric and its various...

Abbas Cheddad – Karlskrona, Sweden

  • Digital Image Forensics
    With the development of information technology and the availability of image acquisition and editing
    tools, the use of these devices has become within a reach to everyone....

Aswani Kumar Cherukuri – Vellore, India

  • Exploring Blockchain Technology
    Blockchain is a distributed ledger technology that maintains verifiable records with protection against malicious modifications and with Byzantine fault tolerance.   This...

Ashutosh Dutta – Laurel, MD, United States

Josiah Dykstra – Severn, MD, United States

  • American Self-Defense in Cyberspace
    The United States is a major consumer, contributor, and target in cyberspace. This talk will describe cyber threats, roles and responsibilities, technology, and policy considerations for achieving...
  • Getting Started with Cybersecurity Science
    This talk offers an introduction for students and practitioners to the application of the scientific method to cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools...

Chuck Easttom – Plano, TX, United States

  • Quantum Computing and Lattice Based Cryptography
    This lecture provides an overview of the current state of quantum computing and what impact that will have on cryptography.  Then cryptogrphic algorithms that are believed to be resistent to...

Mohamed Elhoseny – Mansoura, Egypt

Robert James Fine – Washington, DC, United States

  • The Next Cyber Warfare Wave: AR and VR Worlds
    In this lecture, Robert shares the current vulnerabilities that hackers and bad actors can exploit within the current AR/VR hardware and software platforms, as well as providing current and future...

Sebastian Fischmeister – Waterloo, Ontario, Canada

  • Safety and Security for Future Embedded Systems
    For decades, safety was the dominating topic for cyberphysical systems. Safety of a system ensures that in the case of faults, the system is still highly unlikely to cause harm to users,...

Francesco Flammini – Västerås, Sweden

Swaroop Ghosh – State College, PA, United States

Gururaj H L – Mysuru, India

  • WLAN security and Cyber Security
    Wireless LANs have gone through rapid changes with respect to their security architecture in recent years. One view has been to incorporate WLANs under already existing VPN umbrellas and to...

Rasheed Hussain – Innopolis, Russian Federation

  • Distributed Ledger Technology for Charging on the move
    In this talk, I will present the blockchain technology for constrained environments. As application use-case, we consider the autonomous cars and charging. For the efficient charging, we use IOTA...
  • Future of the Cybersecurity: AI/ML
    In this talk, we will cover the current state of the cybersecurity, the attacker mindset, security doctrine, and the futureof cybersecurity.

Celestine Iwendi – Uppsala, Sweden

Dharm Singh Jat – Windhoek, AR, Namibia

Alireza Jolfaei – Sydney, NSW, Australia

Burak Kantarci – Ottawa, ON, Canada

  • Empowering behaviometrics for authentication
    Learning unique behavioral patterns of an individual can improve detection of identity spoofing while addressing user comfort issues in user authentication processes. To this end, social and...

Sanjay Kumar Madria – Rolla, MO, United States

Weizhi Meng – Copenhagen, Denmark

Varun G Menon – Kochi, Kerala, India

Nour Moustafa – Canberra, ACT, Australia

James F. O'Brien – Berkeley, CA, United States

Zeeshan Pervez – Paisley, United Kingdom

Junaid Qadir – Lahore, Pakistan

  • Secure and Robust Machine Learning for Healthcare
    Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the...

Heena Rathore – Austin, TX, United States

Shishir Kumar Shandilya – Bhopal, India

Biplab Sikdar – Singapore, Singapore

Madhusudan Singh – Daejeon, Republic of Korea

Yan Solihin – Orlando, FL, United States

Houbing Song – Daytona Beach, FL, United States

Shan Suthaharan – Greensboro, NC, United States

Daniel Takabi – ATLANTA, GA, United States

  • Secure Privacy preserving Machine Learning
    Deep learning with neural networks has become a highly popular machine learning method due to recent breakthroughs in computer vision, speech recognition, and other areas. However, the deep...

Wan Abdul Rahim Bin Wan Mohd Isa – Shah Alam, Malaysia

  • Culture Influences to Information Privacy
    There is strong inclination on the importance of knowledge management (KM) concept and role towards ensuring components such as ethics and culture are relevant to the applications development,...

Edgar Weippl – Vienna, Austria

Stefano Zanero – Milano, Italy