Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(186 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Post-Quantum Crypto ==
+
== Privacy for Mobile Apps ==
  
'''DATE:''' 28 February 2017
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 +
|-
 +
| '''TIME:'''&nbsp; 29 April 2020, 14:00h<br />'''Place:'''&nbsp;  Virtual seminar room: email josang@mn.uio.no to get the address, <br /><br />'''AGENDA:'''<br />
 +
14:00h Welcome to AF''Security'''s virtual seminar room<br />14:05h Invited talk:
 +
| <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center>
 +
|}
 +
* '''TITLE:''' &nbsp;''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' &nbsp;''Nurul Momen''&nbsp; (Karlstad University) <br />'''ABSTRACT:'''  What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
  
'''LOCATION:'''&nbsp; Kristen Nygaards sal (room 5370), Ole Johan Dahl's House.
+
14:45h Discussion<br />
  
'''AGENDA:'''
+
'''BIO:''' &nbsp; Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.<br />
  
14:00h Welcome at IFI
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
+
|-
14:15h Talk: ''Post-Quantum Cryptography: A Concise Overview''
+
| [[File:AFSecurity-small.png|250px]]
 
+
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security]
15:00h Discussion
+
| [[File:Sec-light-360.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
+
|}
'''SPEAKER:''' Thomas Gregersen, NSM
 
 
 
'''ABSTRACT:'''
 
Cryptographic research is constantly on the move as new cryptanalytical techniques become available. After the discovery of quantum algorithms that can overcome the computational complexity of cryptographic primitives in current mainstream algorithms, the search is on to find suitable candidate primitives for new quantum resistant algorithms. This research field lives under the banner of post-quantum cryptography.
 
 
 
I will try to give an overview of how quantum algorithms come into play in cryptanalysis and which problems arise for current cryptography. Finally I will sketch some of the families of primitives that have been proposed in the quest for finding solutions that may survive in the post-quantum era.
 
 
 
 
 
'''SPEAKER BIO:'''
 
Thomas Gregersen holds a PhD in mathematics from the University of Oslo. In 2014 he joined NSM (National Security Authorithy) as a researcher.
 

Latest revision as of 16:02, 24 April 2020

Privacy for Mobile Apps

TIME:  29 April 2020, 14:00h
Place:  Virtual seminar room: email josang@mn.uio.no to get the address,

AGENDA:

14:00h Welcome to AFSecurity's virtual seminar room
14:05h Invited talk:

Logo-Karlstad.png
  • TITLE:  Privacy for mobile apps: Technical, regulatory and human challenges
    SPEAKER:  Nurul Momen  (Karlstad University)
    ABSTRACT: What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?

14:45h Discussion

BIO:   Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.

AFSecurity-small.png AFSecurity is organised by the UiO Research Group on Digital Security Sec-light-360.png