Colloquia and Seminars

Computing Science - Colloquia and Seminars

DU-Vote: Remote Electronic Voting with Untrusted Computers

Location: CLT 701 Date/Time: 22nd April 2014, 14:00 - 15:00
Speaker(s): Mark Ryan, University of Birmingham.

Brief Description:

DU-Vote is a new remote electronic voting protocol that eliminates the often-required assumption that voters trust general-purpose computers. Trust is distributed in DU-Vote between a simple hardware token issued to the voter, the voters's computer, and a server run by election authorities. Verifiability is guaranteed with statistically high probability even if all these machines are controlled by the adversary, and privacy is guaranteed as long as at least either the voter's computer or the server is not controlled by the adversary.  The design of the DU-Vote protocol is presented in this paper.

Software Development for and in the Cloud

Location: CLT701 Date/Time: 24th April 2014, 13:00 - 14:00
Speaker(s): Andreas Roth.

Brief Description:

With the cloud as dominating deployment model, industrial software development for enterprise applications has changed and is still changing considerably. In this talk we first discuss the needs of enterprise software development for the cloud compared to the pre-cloud era. We then focus on how software development itself can look like if it consequently exploits the opportunities of the cloud, for instance with respect to providing immediate feedback for developers on how their applications are used, and using . We will demonstrate this at practical examples using SAP HANA, the SAP HANA Cloud Platform and its Web-based development environment.

Multimedia Forensics through Content-Based Device Fingerprint Analysis

Location: CLT. 701. Date/Time: 13th May 2014, 14:00 - 15:00
Speaker(s): Chang-Tsun Li.

Brief Description:

The past several years have seen the uses of various forms of device fingerprints from images in multimedia forensics. Among them, Sensor pattern noises (SPNs) have been proved as one of the most effective way for this task. However, as we demonstrate in this work, the limitation of the current method of extracting SPNs is that the SPNs extracted from images can be severely contaminated by details from scenes, and as a result, the identification rate is unsatisfactory unless images of a large size are used. In this work, we propose a novel approach for attenuating the influence of details from scenes on SPNs so as to improve the device identification rate of the identifier. The hypothesis underlying our SPN enhancement method is that the stronger a signal component in an SPN is, the less trustworthy the component should be, and thus should be attenuated. This hypothesis suggests that an enhanced SPN can be obtained by assigning weighting factors inversely.

When Private Set Intersection Meets Big Data

Location: CLT 701 Date/Time: 20th May 2014, 14:00 - 15:00
Speaker(s): Changyu Dong.

Brief Description:

In this talk, I will present a new Private Set Intersection (PSI) protocol that is extremely efficient and highly scalable compared with existing protocols. The design of the protocol took a novel approach that we call the "data structural" approach. Namely, the high efficiency and scalability is obtained by designing a proper data structure. I will show this data structure, which we call garbled Bloom filter, and the protocol as well. I will also talk about some applications of the protocol.

Vehicular App Development: Opportunities and Challenges

Location: CLT 701 Date/Time: 13th June 2014, 14:00 - 15:00
Speaker(s): Sid Chi-Kin Chau.

Brief Description:In this talk, I examine the opportunities and challenges that lie ahead in vehicular app development, and discuss the implications and issues in aspects such as security, privacy and safety that it entails. I also introduce some of research projects in my group, including an open-source platform for vehicular apps. 

rss iconwrite news icon