Informal Security Meetings
We aim to bring together local security specialists and people who are interested in computer and network security. One major objective is to initiate work, in particular collaborative security research in the school, rather than presenting results.
Our meetings feature informal discussions of research papers, emerging problems, interesting current issues in security, whereas formal presentations are coordinated with and channelled to SRGs, ASLs and school colloquia.
Each meeting is about one hour, and two main formats are used:
- A two-session meeting. The first session accommodates a single presentation of 20-25 minutes or two 10-minute presentations, plus an opportunity for questions and answers. Work in progress, half-baked ideas and PhD proposals can all be a good short presentation. The second session is dedicated to reports of any interesting recent developments and discussions of interesting current problems.
- Reading group exercise: a participant presents one new paper of common interest -- the presented research need not be your own! S/he also responds to audience scrutiny, and coordinates discussion on the presented topic.
The scheduling of the meetings is currently handled by Jeff Yan, who initiated this effort. Please email a title and a short abstract at least two days in advance. Jeff also manages cs-security, a local emailing list for discussing all security-related issues.
Security Meetings held in the past are listed by year [ 2006 ] below.
2006
|
Date/Time |
Venue |
Title |
Speaker |
Friday, 19 May 14:00 |
CLT922 |
Pret a Voter with visual crypto |
Peter Ryan |
Friday, 12 May 14:00 |
CLT922 |
Parameterised Role-based Access Control in Virtual Organisations |
Xiaofeng Gong |
Friday, 5 May 14:00 |
CLT922 |
Security is still a dirty word |
Mike Ellison |
Friday, 28 April 14:00 |
CLT922 |
On evaluating authentication mechanisms |
Jeff Yan |
Friday, 21 April 14:00 |
CLT9.22 |
PassMark: a two-factor two-way authentication mechanism |
Jake Wu |
Friday, 7 April 14:00 |
CLT 9.22 |
Formal Analysis of Access Control Policies |
Jeremy Bryans |
Friday, 24 March 14:00 |
CLT 9.22 |
Active cookies, browser authentication and phishing defense |
Robert Stroud |
Friday, 17 March 14:00 |
CLT9.22 |
SSL, Phishing and Man in the Middle |
Robert Stroud |
Friday, 10 March 14:00 |
CLT9.22 |
Personal experience of online-banking authentications |
Robert Stroud |
Friday, 24 February 15:30 |
CLT 922 |
Automated Turing test and bots prevention |
Jeff Yan |
Friday, 24 February 16:10 |
CLT 922 |
Phishing |
Zisis Pitsiavas |
|