crysp.uwaterloo.ca
Cryptography, Security, and Privacy (CrySP) | SCS | UW
https://crysp.uwaterloo.ca/prospective
CrySP actively encourages students interested in cryptography, security, or privacy to apply to the school's graduate program. Top Five Reasons To Do CS Graduate Studies At Waterloo. Applications should be submitted via the school's standard application process. Please do not email individual CrySP faculty members regarding applications. We get too many of these messages, and we are unable to respond to them. Instead, inquiries should be sent to. Cryptography, Security, and Privacy Research Group.
crysp.uwaterloo.ca
Cryptography, Security, and Privacy (CrySP) | SCS | UW
https://crysp.uwaterloo.ca/speakers
CrySP Speaker Series on Privacy. This speaker series is made possible by an anonymous charitable donation in memory of cypherpunks and privacy advocates Len Sassaman. 15 Sep 2016: Valerie Steeves, University of Ottawa. What Hello Barbie Can Tell Us About Behavioural Targeting". 2:30 pm, DC 1302. 10 Nov 2016: David Murakami Wood, Queen's University. 7 July 2016: Paul van Oorschot, Carleton University. Password expiration policies: quantifying assumed security benefits" ( video. New adversary models for ce...
crysp.uwaterloo.ca
Cryptography, Security, and Privacy (CrySP) | SCS | UW
https://crysp.uwaterloo.ca/prospective/postdoc
The Cryptography, Security, and Privacy (CrySP) research group at the University of Waterloo is seeking applications for a postdoctoral research position in the field of security and privacy for location-based or mobile systems and applications. This position will be held in the Cheriton School of Computer Science, and there will be the possibility for collaboration with Google Waterloo. Applicants must hold a PhD in a related field and should have a convincing publication record. Applicants must hold a ...
crysp.uwaterloo.ca
Cryptography, Security, and Privacy (CrySP) | SCS | UW
https://crysp.uwaterloo.ca/people
The members of CrySP are:. Other faculty with interests in cryptography, security, or privacy:. Navid Esfahani (D. Stinson). Nikolas Unger (I. Goldberg). D Jao, S. Gorbunov). U Hengartner, C. Clarke). Kritika Iyer (I. Goldberg). Christopher McKnight (I. Goldberg). Sajin Sasy (S. Gorbunov). Justin Tracey (I. Goldberg). PhD, Spring 2016, U. Hengartner). MMath, Spring 2016, U. Hengartner). Vladimir Soukharev (Ph.D., Spring 2016, D. Jao). Tao Wang (Ph.D., Winter 2016, I. Goldberg). PDF, Fall 2013). Femi Olum...
crysp.uwaterloo.ca
Cryptography, Security, and Privacy (CrySP) | SCS | UW
https://crysp.uwaterloo.ca/courses
These are the courses about cryptography, security, or privacy given by CrySP faculty members. Note that the offering dates and instructors listed are subject to change. Courses in the School of Computer Science. CS 458/658 Computer Security and Privacy. CS 634 Security and Privacy for Health Systems. CS 758 Cryptography / Network Security. This course covers cryptographic protocols and their application to secure communication, especially in a network setting. Course home page. This is a seminar course ...
crysp.uwaterloo.ca
Cryptography, Security, and Privacy (CrySP) | SCS | UW
https://crysp.uwaterloo.ca/software
The members of CrySP are involved in various software projects and distributions. Here is a sampling:. PrivacyGuard is an Android app that alerts you when one of your apps leaks sensitive information to a remote server. FireLock is an Android lock library to re-authenticate users conveniently and securely. Leading Johnny to Water: Usable Secure Email. Lavinia is a censorship-resistant publishing system that uses a payment system to incentivize adherence to the protocol and ensure document availability.
crysp.uwaterloo.ca
Cryptography, Security, and Privacy (CrySP) | SCS | UW
https://crysp.uwaterloo.ca/publications
Recent publications about cryptography, security, or privacy and co-authored by CrySP members:. Books and Book Chapters. SSM Chow, C.-K. Chu, X. Huang, J. Zhou, R.H. Deng. Dynamic Secure Cloud Storage with Provenance. Festschrift Jean-Jacques Quisquater. pp. 442–464. 2012. A Biryukov, G. Gong and D. R. Stinson (eds.) Selected Areas in Cryptography — SAC 2010 Proceedings. Lecture Notes in Computer Science, vol. 6544. Springer-Verlag, Berlin, 2011. D R Stinson and J. Upadhyay. Is extracting data th...Journ...