91一级特黄大片|婷婷中文字幕在线|av成人无码国产|日韩无码一二三区|久久不射强奸视频|九九九久久久精品|国产免费浮力限制

筑波大學(xué)Kazumasa Omote,大阪大學(xué)蘇春華于2月21日訪問桂電
來源: 劉憶寧/
無業(yè)
2059
3
0
2017-02-22

 

應(yīng)桂電劉憶寧邀請(qǐng),日本筑波大學(xué)Kazumasa Omote,大阪大學(xué)蘇春華于2月21日訪問桂電,并做如下報(bào)告:

 

1. Towards Detection of Cyber Attacks

Speaker: Kazumasa Omote, Tsukuba University

 

Abstract: Recently, the attacks called Advanced Persistent Threat (APT) attack targeting a specific organization are increasing. APT attack usually uses malware called Remote Access Trojan (RAT) which can steal the confidential information from a target organization by remote operation. Due to an increasing number of APT attacks that cannot be prevented by only entrance measures, the exit measures have become important. In this talk, I explain the new cyber-threat such as APT attack or RAT, and I introduce our latest RAT detection techniques.

 

Biography: KAZUMASA OMOTE received the Ph.D. degree in information science from the Japan Advanced Institute of Science and Technology (JAIST), in 2002. He was with Fujitsu Laboratories, LTD, from 2002 to 2008, and was involved in research and development of network security. He has been a Research Assistant Professor with JAIST since 2008, where he has also been an Associate Professor since 2011. His research interests include applied cryptography and network security.

 

2.Title: Cryptography and its applications in information security

Speaker: Chunhua Su, Osaka University

 

Abstract: Cryptography is one of the most important core technologies for information security. Nowadays, rapid growth of big data processing and IoT enable services among multiple organizations bring both promising prospects and security & privacy challenges. With light-weight devices which are connected in the environment of IoT networks, huge volume and various data can be gathered from all over the world. It is crucial to secure and utilize such Big data. In this talk, the lecturer will introduce his research on design and security analysis of cryptographic primitives, and cryptographic application in construction secure protocols for big data utilization and IoT-enable services, including secure data outsourced analysis, privacy-preserving data mining and data management, secure authentication schemes for IoT devices and so on.

 

Biography: Chunhua Su received the BS degree for the Beijing Electronic and Science Institute in 2003 and the MS and PhD degrees in computer science from the Faculty of Engineering, Kyushu University in 2006 and 2009, respectively. He is currently working as an associate professor in the School of Information Science, Osaka University. He has worked as a scientist in the Cryptography & Security Department of the Institute for Infocomm Research, Singapore from 2011 to 2013. His research areas include algorithm, cryptography, data mining, and RFID security & privacy.


登錄用戶可以查看和發(fā)表評(píng)論, 請(qǐng)前往  登錄 或  注冊(cè)。
SCHOLAT.com 學(xué)者網(wǎng)
免責(zé)聲明 | 關(guān)于我們 | 聯(lián)系我們
聯(lián)系我們: