DIMACS Workshop on Coding-Theoretic Methods for Network Security
April 1 - 3, 2015
DIMACS Center, CoRE Building, Rutgers University
- Organizers:
- Mahdi Cheraghchi, University of California, Berkeley
- Salim El Rouayheb, IIT
- Emina Soljanin, Bell Labs, emina at research.bell-labs.com
Presented under the auspices of the DIMACS Special
Focus on Cybersecurity.
Workshop Program:
Wednesday, April 1, 2015
8:00 - 9:00 Registration and Breakfast - 4th Floor, Lounge, CoRE Building
9:00 - 9:15 Welcome and Greetings by the organizers
Emina Soljanin, Mahdi Cheraghchi, Salim El Rouayheb
Chair: Salim
9:15 - 10:15 New Techniques for Rebuilding Data Efficiently and Securely
Jason Resch, Cleversafe
10:15 - 11:00 Break
11:00 - 12:00 Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics
Allison Bishop Lewko, Columbia University
12:00 - 1:50 Lunch - 4th Floor, Lounge, CoRE Building
1:50 - 2:00 DIMACS Director's Welcome
Rebecca Wright, DIMACS Director
Chair: Mahdi
2:00 - 3:00 Polytope Codes in Networks, Storage, and Multiple Descriptions
Oliver Kosut, Arizona State University
3:00 - 3:45 Break
3:45 - 4:45 Codes with Local Decoding Procedures
Sergey Yekhanin, Microsoft Researcher
4:45 - 5:30 Discussion groups
Thursday April 2, 2015
8:30 - 9:15 Breakfast - 4th Floor, Lounge, CoRE Building
Chair: Rei
9:15 - 10:15 Applications of Secure Coding in Distributed Storage and Wireless Networking
Reza Curtmola, NJIT
10:15 - 11:00 Break
11:00 - 12:00 Non-malleable Codes in the Split-State Model
Yevgeniy Dodis, New York University
12:00 - 2:00 Lunch - 4th Floor, Lounge, CoRE Building
Chair: Cristina
2:00 - 2:20 Limited View Adversaries: Reliability and Security
Rei Safavi, Calgary
2:20 - 2:40 On the Computational Security of the Static Distributed Storage System
Annina Bracher, ETH Zurich
2:40 - 3:00 Towards Universal Weakly-Secure Codes for Data Exchange and Storage
Alex Sprintson, TAMU
3:00 - 3:20 Robust Secret Sharing Schemes Against Local Adversaries
Valerio Pastro, Columbia University
3:20 - 4:00 Break
4:00 - 4:20 On the Connection Between Multiple-Unicast Network
Coding and Single-Source Single-Sink Network Error Correction
Joerg Kliewer, NJIT
4:20 - 4:40 How to Store a Secret
Salim El Rouayheb, IIT
4:40 - 5:00 An NSF view of Information-theoretic Network Security
Philip Regalia, NSF
5:00 Dinner
Friday April 3, 2015
8:30 - 9:15 Breakfast - 4th Floor, Lounge, CoRE Building
Chair: Emina
9:15 - 10:15 Tamper Detection and Non-malleable Codes
Daniel Wichs, Northeastern University
10:15 - 11:00 Break
11:00 - 12:00 Byzantine-resilient routing and key management protocols using network coding
Cristina Nita, Purdue
12:00 - 2:00 Lunch - 4th Floor, Lounge, CoRE Building
2:00 - 5:00 Discussion
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on March 30, 2015.