在线看一区二区,偷拍大香蕉,www.91蜜桃av,成人黄色激情视频APP

當前位置: > 學術(shù)報告 > 文科 > 正文

文科

Post-compromise security

發(fā)布時間:2018-05-30 瀏覽:

報告人:于江山,澳大利亞莫納什大學助理教授、博士生導師

報告日期:201861

報告時間:14:30-16:00  

報告地點:文津樓3628報告廳

報告摘要:

The security of cryptosystems relies on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. Attackers can (and they do in practice) make use of them to break the security of systems. This talk presents our research on how to mitigate cryptographic secret key compromise in two different cases. The first case considers compromised certificate authorities in public key infrastructure (PKI). We propose a new system, called Distributed and Transparent Key Infrastructure (DTKI), based on Google's Certificate Transparency project. DTKI is the first web PKI that is secure even if all service providers are compromised. The second case considers the key compromise in secure communication. We propose a multi-device messaging protocol, called DECIM, to allow users to detect the compromise of their device keys. A beta version of DECIM is integrated with an end-to-end secure email solution (as an adds-on of Thunderbird), and is OpenPGP compatible. Both systems use public ledgers to provide transparency, and the systems are co-designed with formal models. We verify their core security properties using the Tamarin Prover.

報告人簡介:

Jiangshan Yu will be a lecturer at Monash University from this September. Currently, he is a research fellow working with Prof. Paulo Esteves-Verissimo at SnT, University of Luxembourg (LU), and an honorary research fellow working with Prof. Mark Ryan in the University of Birmingham (UK). He is also a director of a University of Birmingham spin-out company. Previously, he obtained his PhD degree from the University of Birmingham, UK, and his MPhil and MSc. degree from University of Wollongong, Australia. He has broad research interests in computer security and cryptography, and has worked on topics such as cryptographic key management, blockchain consensus, and ledger-based applications. His research impact includes patent-pending ledger-based applications that have been covered by more than 40 international news medias including ACM TechNews, ScienceDaily, and SiliconRepublic, and have been developed by a University of Birmingham spin-out company. He has also co-designed a security solution on cryptographic key management for Huawei Ltd to manage their next generation network devices securely. He has been awarded the 'Chinese Government Award for Outstanding scholar abroad', the success rate is 3% in UK and 1% worldwide.

 

亚洲系列| 成人caoprom| 色94色欧美sute亚洲线路一久| 24av啪亚洲| 粉嫩精品| 日韩亚洲黄色电影网站| 国产AB免费视频| 插下面在线播放| 粉嫩AV.com| 婷中文字幕一区一| 日本久久www一区二区| 天天天爽夜夜爽18| 亚洲校园春色欧美| 好吊久久99视频网站| 天天精彩一区二区| 番号网123abs一区二区| 午夜网站国产一二黄色| 91麻豆插入| 久久久区人妻| 日韩AV在线国语对白 丝袜| 伊人a一区二区| 99日大香蕉| 午夜福利视频操| av无码网站| 婷婷 久久 99| 欧洲精品成人午夜| 国产美女下面一区| 成一区二区三区在线| 中文色在线| 在线观看欧美一区二区| 嫖娼一级爽α片| 日本精品视频中文字幕免费| 日本哦少妇高清一二区| 99久久久成人精品免费| 后入内射无码人妻| 久久激情后入123区| 久久特级性情| 欧美日韩亚洲色| 有码视频在线免费播放| 色大师一二三区| 亚洲精品欧美在线久久视频|