12:30pm-1pm | Refreshments and signing the memorial book | |
1:00pm-1:10pm | Opening Speech | Dawn Song/Elaine Shi
|
1:10pm-1:20pm | Emil’s Path ORAM | Marten van Dijk
|
1:20pm-1:30pm | The Ascend Secure Processor | Srini Devadas
|
1:30pm-1:40pm | PHANTOM: Building Emil's Path ORAM algorithm into hardware | Martin Maas/Eric Love
|
1:40pm-1:50pm | Perfect Crowdsourcing Privacy, in Practice | Ulfar Erlingsson
|
1:50pm-2:00pm | Platform for Private Data | Mohit Tiwari
|
2:00pm-2:15pm | Searchable Encryption | Seny Kamara/Ch. Papamanthou
|
2:15pm-2:25pm | Duress Detection for Authentication Attacks Against Multiple Administrators | Mike Atallah (remote)
|
2:25pm-2:35pm | Studying Human Problem Solving | Zygmunt Pizlo (remote)
|
2:35pm-2:45pm | Hourglass Schemes: Proving At-Rest Encryption in the Cloud | Ari Juels (remote)
|
2:45pm-2:55pm | Cloud Auditing | Alina Oprea (remote) |
2:55pm-3:05pm | Open Mic | |
3:05pm-3:10pm | Memorial silence, Poem reading | |
3:10pm-3:20pm | Memorial certificate granting ceremony for Emil's academic achievements & Closing Speech | David Culler & Plamen Stefanov
|
3:20pm-5:30pm | Hike near Berkeley | |
6:00pm-8:00pm | Dinner (Cafe La Mediterranee, 2936 College Avenue, Berkeley) | |
This is the best security protocol that I have ever seen and I really like to get use to these types of things. It has been a great idea to know about the new security protocols.
ReplyDeleteReally nice information has been provided we would like to let you know that We are professional data,network, video, paging cabling services provider in Houston region. We provide life time warranties on our cable and installation services along with certification. Visit us on Network Cabling Houston
ReplyDelete