Security and Privacy

Available Speakers on this Topic

Salman A Baset – New York, NY, United States

  • Blockchain and GDPR
    The European Union’s ("EU") General Data Protection Regulation ("GDPR"), which went into effect on 25 May 2018, is the most significant overhaul of EU data...
  • Container Security
    Whether you are an operator looking to provide a container platform for your customers or whether you are building applications using containers, the question of container security must be on your...
  • Hyperledger Fabric
    Hyperledger Fabric is an open source project under Linux Foundation, which can be used to build a permissioned blockchain. This talk will give an overview of Hyperledger Fabric and its various...

Dipankar Dasgupta – Memphis, TN, United States

  • Puzzle-based learning in Cyber Security Education
    Different forms of puzzles are in existence for people to think, expand knowledge and stimulate their cognitive ability.  Puzzle-based learning has proven to result in a better STEM learning...

Josiah Dykstra – Severn, MD, United States

  • American Self-Defense in Cyberspace
    The United States is a major consumer, contributor, and target in cyberspace. This talk will describe cyber threats, roles and responsibilities, technology, and policy considerations for achieving...
  • Getting Started with Cybersecurity Science
    This talk offers an introduction for students and practitioners to the application of the scientific method to cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools...

Chuck Easttom – Plano, TX, United States

  • Quantum Computing and Lattice Based Cryptography
    This lecture provides an overview of the current state of quantum computing and what impact that will have on cryptography.  Then cryptogrphic algorithms that are believed to be resistent to...

Sebastian Fischmeister – Waterloo, Ontario, Canada

  • Safety and Security for Future Embedded Systems
    For decades, safety was the dominating topic for cyberphysical systems. Safety of a system ensures that in the case of faults, the system is still highly unlikely to cause harm to users,...

Silvia Giordano – MANNO ,TI, Switzerland

Gururaj H L – Mysuru, India

  • WLAN security and Cyber Security
    Wireless LANs have gone through rapid changes with respect to their security architecture in recent years. One view has been to incorporate WLANs under already existing VPN umbrellas and to...

Rasheed Hussain – Innopolis, Russian Federation

  • Distributed Ledger Technology for Charging on the move
    In this talk, I will present the blockchain technology for constrained environments. As application use-case, we consider the autonomous cars and charging. For the efficient charging, we use IOTA...
  • Future of the Cybersecurity: AI/ML
    In this talk, we will cover the current state of the cybersecurity, the attacker mindset, security doctrine, and the futureof cybersecurity.
     
    We...

Dharm Singh Jat – Windhoek, AR, Namibia

Ashish Kundu – Yorktown Heights, NY, United States

Sanjay Kumar Madria – Rolla, MO, United States

James F. O'Brien – Berkeley, CA, United States

Abhik Roychoudhury – Singapore, Singapore

  • Automated Program Repair
    Software debugging is extremely time consuming, and hence techniques to aid automated program repair are of value. Moreover, even after software errors are identified, fixing the...
  • Testing and Debugging of Software Regressions
    Software regressions, where a previously working program fails on certain tests after changes, constitute a major source of delays and missed schedules in any large software...

Sandeep K Shukla – Kanpur, India

Richard Stallman – Boston, MA, United States

  • A Free Digital Society: What Makes Digital Inclusion Good Or Bad?
    There are many threats to freedom in the digital society. They include massive surveillance, censorship, digital handcuffs, nonfree software that controls users, and the War on Sharing....
  • Computing, Freedom and Privacy
    The way digital technology is developing, it threatens our freedom, within our computers and in the internet. What are the threats? What must we change?
  • Copyright vs. Community in the Age of Computer Networks
    Copyright developed in the age of the printing press, and was designed to fit with the system of centralized copying imposed by the printing press. But the copyright system does not fit...
  • Free Software and Your Freedom
    The Free Software Movement campaigns for computer users' freedom to cooperate and control their own computing. The Free Software Movement developed the GNU operating system, typically...
  • The Danger of Software Patents
    Richard Stallman will explain how software patents obstruct software development. Software patents are patents that cover software ideas. They restrict the development of software, so that every...

Shan Suthaharan – Greensboro, NC, United States

Wan Abdul Rahim Bin Wan Mohd Isa – Shah Alam, Malaysia

  • Culture Influences to Information Privacy
    There is strong inclination on the importance of knowledge management (KM) concept and role towards ensuring components such as ethics and culture are relevant to the applications development,...

Edgar Weippl – Vienna, Austria

Tao Xie – Raleigh, IL, United States