跳到主要內容區塊
:::
  • 首頁
  • 最新消息
  • [圖書館]2012/11/15~16 Taiwan-Germany Workshop on Information Security and Crypto & TWISC Annual Exhibition, 2012

[圖書館]2012/11/15~16 Taiwan-Germany Workshop on Information Security and Crypto & TWISC Annual Exhibition, 2012

更新時間:2012-11-12 10:36:58 / 張貼時間:2012-11-12 10:27:57
圖書館羅威
單位圖書館
1,809

 

Taiwan-Germany Workshop on Information Security and Crypto & TWISC Annual Exhibition, 2012

Date: November 15-16, 2012

Location: 6F Conference Room at  National Chung Hsing University Library 

Schedule

November 15 (Thursday)

2012 Annual TWISC Workshop, 1st day

   
10:00-10:30 Registration
10:30-10:50 Welcome
Session I: Network Security
10:50-11:30 On the Study of Network Threat Detection and Platform for Attack and Defense
  (TWISC@NCKU)
11:30-12:10 Mobile Cloud Platform for Mutant Malware Behavior Analysis
  (TWISC@NCTU)
12:10-14:00 Lunch
Session II: Lattice Cryptography
14:00-14:40 Lattice-Based Cryptography - An Alternative for the Future Internet?
  Michael Schneider (TU Darmstadt)
14:40-15:20 A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
  Jintai Ding (U of Cincinnati)
15:20-15:40 Coffee Break
Session III: Finding the Flaws
15:40-16:20 Application and Service Security Research at TWISC@AS
  Hwai-Jung Hsu (Academia Sinica)
16:20-17:00 Anomaly Detection via Online Over-Sampling Principal Component Analysis
  Yuh-Jye Lee (NTUST)
TWISC Annual Exhibition
17:00-17:40 TWISC Research Outcome Exhibition (Demo & Poster)
18:30 Banquet (by invitation only)
   
   

November 16 (Friday)

2012 Annual TWISC Workshop, 2nd day

   
08:30-09:00 Registration
Session IV: Implementation and Operation
09:00-09:40 Implementation of Federated Security Service Platform for NFC-enabled Applications
  (TWISC@NTUST)
09:40-10:20 HYDRA: a Flexible Post-Quantum Crypto Processor
  Chen-Mou Cheng (NTU)
10:20-10:40 Coffee Break
Session V: Tools of the Trade
10:40-11:20 IT Forensics: Silver Bullet or Pandora's Box?
  Martin Steinebach (Fraunhofer Institute)
11:20-12:00 Practical and Theoretical Aspects of Computational Number Theory and Their Relevance to Cryptanalysis
  Dimitar Jetchev (EPFL)
12:00-14:00 Lunch
Session VI: Information Security is Fun
14:00-14:40 Security Analysis of Wireless Systems in the Real World
  Timo Kasper (RU Bochum)
14:40-15:20 The DNS Security Mess
  Daniel J Bernstein (TU Eindhoven)
15:20-16:00 Mining your p's and q's
  J Alex Haldermann (U Michigan)
Discussion Session
16:00 Discussion
  • 本訊息負責人 圖書館參考組(張育芬小姐)
  • 電話 04-22840291#147
  • E-mail reflib@nchu.edu.tw
Back