Friday, November 1, 2019

Friday, November 1, 2019 10:30 AM EDT

Amira Ghenai, PhD candidate
David R. Cheriton School of Computer Science

Friday, November 1, 2019 1:30 PM EDT

Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science

Friday, November 1, 2019 2:30 PM EDT

Crispin Cowan, Leviathan Security Group

Privacy, especially anonymity, is tricky, because you don’t want to trust anyone, lest your identity leak, but you must trust someone, or else you cannot communicate. Threat modeling is rarely used in privacy, instead most used for prioritizing security hardening efforts. 

Friday, November 1, 2019 3:00 PM EDT

Joan Bartlett, School of Information Studies
McGill University

S M T W T F S
28
29
30
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
  1. 2024 (98)
    1. April (21)
    2. March (27)
    3. February (25)
    4. January (25)
  2. 2023 (296)
    1. December (20)
    2. November (28)
    3. October (15)
    4. September (25)
    5. August (30)
    6. July (30)
    7. June (22)
    8. May (23)
    9. April (32)
    10. March (31)
    11. February (18)
    12. January (22)
  3. 2022 (245)
  4. 2021 (210)
  5. 2020 (217)
  6. 2019 (255)
    1. December (21)
    2. November (25)
    3. October (16)
    4. September (20)
    5. August (18)
    6. July (12)
    7. June (23)
    8. May (23)
    9. April (32)
    10. March (25)
    11. February (16)
    12. January (24)
  7. 2018 (217)
  8. 2017 (36)
  9. 2016 (21)
  10. 2015 (36)
  11. 2014 (33)
  12. 2013 (23)
  13. 2012 (4)
  14. 2011 (1)
  15. 2010 (1)
  16. 2009 (1)
  17. 2008 (1)