Presented by Lucas Lapczyck as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Network traffic encryption is a widely adopted mechanism to prevent eavesdropping on network communications. Since traditional network monitoring approaches such as Deep Packet Inspection cannot be applied on encrypted traffic, there …
A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption Biometric authentication is seen as a mixed offering, the ease and comfort of a system that knows who you are without you having to work to prove it (as with a password) is balanced against the need to store personal information and the potential …
La cryptographie bien réalisée est devenue importante car les impacts de sa mauvaise mise en oeuvre se fait de plus en plus ressentir par les journalistes, les lanceurs d’alerte et les activistes politiques. Nik Unger et Dr. Ian Goldberg de l’Université de Waterloo ont travaillé sur l’amélioration de la cryptographie les services de messagerie. La …
Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber from Technische Universität Darmstadin Germany look into potential security side effects of new energy management features in CPUs. Energy management is an issue of growing importance as the amount of resources required to process and store the massive amount of data the information society requires. Software based …
Ben Buchanan looks at American Exceptionalism in the form of the NOBUS approach to signals intelligence in his contribution to the Hoover Institution’s Aegis Paper Series. There is a tension between the needs of nations in the information age to both secure and steal communications. The United States has traditionally met this by exploiting a …
Vinay Kaura provides some insight into the impact of the Internet on insurgency in the region of Kashmir. This region has famously been in conflict for more than half a century and has crossed over into the digital realm. The problems are deeply complex and the informatization of the region has created additional layers with …
In this video, Prof. Jeremy Clark defines what bitcoin is, how it is used and its relation to cybercrime. This talk was presented in Toronto on May 31, 2016, at the SERENE-RISC Tutorial “Examining Cybercrime 2: Financial Edition”. Jeremy takes something mystical and clearly explains it. There’s this data structure which you may have heard …
With support from the William and Flora Hewlett Foundation, the Berkman Center for Internet Society at Harvard University a diverse group of security and policy experts from academia, civil society, and the U.S. intelligence community convened to discuss some of the difficult problems of surveillance and cybersecurity. This occurred at the time of public about …