DIMACS Workshop on Coding-Theoretic Methods for Network Security (original) (raw)
DIMACS Workshop on Coding-Theoretic Methods for Network Security
April 1 - 3, 2015
DIMACS Center, CoRE Building, Rutgers University
Organizers:
Mahdi Cheraghchi, University of California, Berkeley
Salim El Rouayheb, IIT
Emina Soljanin, Bell Labs, emina at research.bell-labs.com
Presented under the auspices of the DIMACS Special Focus on Cybersecurity.
Workshop Program:
Wednesday, April 1, 2015
8:00 - 9:00 Registration and Breakfast - 4th Floor, Lounge, CoRE Building
9:00 - 9:15 Welcome and Greetings by the organizers Emina Soljanin, Mahdi Cheraghchi, Salim El Rouayheb
Chair: Salim
9:15 - 10:15 New Techniques for Rebuilding Data Efficiently and Securely Jason Resch, Cleversafe
10:15 - 11:00 Break
11:00 - 12:00 Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko, Columbia University
12:00 - 1:50 Lunch - 4th Floor, Lounge, CoRE Building
1:50 - 2:00 DIMACS Director's Welcome Rebecca Wright, DIMACS Director
Chair: Mahdi
2:00 - 3:00 Polytope Codes in Networks, Storage, and Multiple Descriptions Oliver Kosut, Arizona State University
3:00 - 3:45 Break
3:45 - 4:45 Codes with Local Decoding Procedures Sergey Yekhanin, Microsoft Researcher
4:45 - 5:30 Discussion groups
Thursday April 2, 2015
8:30 - 9:15 Breakfast - 4th Floor, Lounge, CoRE Building
Chair: Rei
9:15 - 10:15 Applications of Secure Coding in Distributed Storage and Wireless Networking Reza Curtmola, NJIT
10:15 - 11:00 Break
11:00 - 12:00 Non-malleable Codes in the Split-State Model Yevgeniy Dodis, New York University
12:00 - 2:00 Lunch - 4th Floor, Lounge, CoRE Building
Chair: Cristina
2:00 - 2:20 Limited View Adversaries: Reliability and Security Rei Safavi, Calgary
2:20 - 2:40 On the Computational Security of the Static Distributed Storage System Annina Bracher, ETH Zurich
2:40 - 3:00 Towards Universal Weakly-Secure Codes for Data Exchange and Storage Alex Sprintson, TAMU
3:00 - 3:20 Robust Secret Sharing Schemes Against Local Adversaries Valerio Pastro, Columbia University
3:20 - 4:00 Break
4:00 - 4:20 On the Connection Between Multiple-Unicast Network Coding and Single-Source Single-Sink Network Error Correction Joerg Kliewer, NJIT
4:20 - 4:40 How to Store a Secret Salim El Rouayheb, IIT
4:40 - 5:00 An NSF view of Information-theoretic Network Security Philip Regalia, NSF
5:00 Dinner
Friday April 3, 2015
8:30 - 9:15 Breakfast - 4th Floor, Lounge, CoRE Building
Chair: Emina
9:15 - 10:15 Tamper Detection and Non-malleable Codes Daniel Wichs, Northeastern University
10:15 - 11:00 Break
11:00 - 12:00 Byzantine-resilient routing and key management protocols using network coding Cristina Nita, Purdue
12:00 - 2:00 Lunch - 4th Floor, Lounge, CoRE Building
2:00 - 5:00 Discussion
Contacting the Center
Document last modified on March 30, 2015.