ISG Student Seminars 2007-2008


The ISG Student Seminars are held weekly, on Thursday at 1 PM in Room 229, Mc Crea building, RHUL.

Please mail any questions regarding this seminar series to s.srinivasan at rhul.ac.uk.

Everyone is welcome (if you are a student from some other institution or visitng the ISG, please feel free to drop in). As an added motivation, biscuits are provided, thanks to the efforts of Raminder Ruprai.

The atmosphere is cordial and the aim of these series is to provide a platform for PhD students to present their work, gain valuable presentation skills, obtain feedback and of course get to know people in the department.

Details of talks and slides from the last semester can be found here

The following is a provisional list of talks scheduled for this term. Titles and more updates soon.

24 Jan
Speaker: tba
Title: tba
Abstract:
tba

31 Jan
Speaker:Keith Martin
Title: Open meeting
Agenda:
Explain the research training sessions that the department is organising over the coming months.

7 Feb
Speaker: Keith Martin
Title: Bluffer's Guide to Research
Abstract:

14 Feb
Speaker: Stephen Wolthusen
Please note that the time for this talk is 3-4PM
Title: Research and Literature
Abstract:
Slides

21 Feb
Speaker: Dalia Khader
Title:Attribute Based Group Signatures
Abstract:
Alice needs a document signed by an employee in Bob's company. However, this document should be signed by some manager either senior or junior in the Cryptography department or it has to be signed by a senior manager in the biometrics department. Attribute Based Group Signature(ABGS) Scheme is a cryptographic scheme that helps verify the signatures in such a scenario. In this presentation I will be covering the main definition of ABGS and it's security notions. I will then give an example of the construction of an ABGS scheme. Finally, I would like to provide a brief overview some of my current work and future plans.Slides

28 Feb
Speaker Nicholas Hoare
Title:An Overview of the History and Current Trends in Covert Channel Technology
Abstract:
tbaSlides

6 Mar
Speaker: Kaisa Matomaki
Title: Prime numbers of the form aq^2+1
Abstract:
An old conjecture says that there are infinitely many prime numbers of the form n^2+1, where n is an integer. As proof of this seems to be far out of reach, I will discuss different approximations to the conjecture. In particular, I will talk about my recent work showing that for any alpha > 1/2, there are infinitely many primes p = aq^2+1, where integer a < p^{alpha} and q is a prime.Slides

13 Mar
Speaker: Boyeon Song
Title:RFID Authentication Protocol for Low-cost Tags
Abstract:
In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy and security features and is also efficient. The new protocol resists tag information leakage, tag location tracking, replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation (also under an assumption). We also show that it requires less tag-side storage and computation than other similarly structured RFID protocols.Slides

20 Mar
Speaker: S. Srinivasan
Title:IBE, Beyond Indistinguishability or Alphabetti Spaghetti
Abstract:
The first half of the talk will be a tutorial where I will explain the "basics" of provable security, identity based encryption, and work through an example of the often cryptic security notions one encounters in cryptography papers. In the second half I will talk about some of my recent work on Multi-TA IBE.Slides

27 Mar
Speaker: Muntaha Alawneh
Title:Combining DRM with Trusted Computing for Effective Information Access Management
Abstract:
In this paper we used Digital Rights Management (DRM) associated with Trusted Computing to enforce a content-specific fine-grained access control policy defined by content owner. This policy is associated with content, and when content is copied its access control policy is copied and bound to the target copy. This paper presents a generic approach for content protection utilising both DRM and Trusted Computing technologies. We then discuss how the proposed workflow can be used to solve problems associated with three different applications that benefits from using DRM associated with Trusted Computing services. These are clinical information system, personal networks, and corporate networks.

3 Apr
Speaker: Lishoy Francis
Title: Cancelled
Abstract:
tba

12 June
Speaker: Ian Sargeant
Title: Securing Legacy Airborne Platforms Using Modern Techniques
Abstract:
The seminar will present Ian Sargeant's work to date within his Part-Time PhD at Royal Holloway and will introduce several aspects of the airborne environment, highlighting how this can differ from the normal office environment! The presentation will explain the basic principle of data transmission around an airborne platform, explaining and focusing in on data transmission techniques specific to the airborne environment, and highlight potential issues that are currently risk managed and propose new methods to assist in the data owner in assessing and lowering the risk to their data.

If you would like to volunteer, please drop me a mail at s.srinivasan at rhul.ac.uk.