THIS SITE

Information for

Events

Tuesday, June 19, 2018 — 11:30 AM EDT

Edward Zulkoski, PhD candidate
David R. Cheriton School of Computer Science

Thursday, June 21, 2018 — 9:30 AM EDT

Michael Cormier, PhD candidate
David R. Cheriton School of Computer Science

Thursday, June 21, 2018 — 9:30 AM to 3:30 PM EDT

The David R. Cheriton School of Computer Science is pleased to announce its inaugural Wes Graham Research Symposium & Computer Science Awards reception. The symposium takes its name from James Wesley (Wes) Graham, a humble visionary known as the “father of computing” at the University of Waterloo and an academic who devoted his career to making the magic of computers available to everyone. 

Friday, June 22, 2018 — 10:30 AM EDT

Cristina Tavares, Master’s candidate
David R. Cheriton School of Computer Science

Friday, June 22, 2018 — 1:30 PM EDT

Matei Ripeanu, Department of Electrical and Computer Engineering
University of British Columbia

Friday, June 22, 2018 — 5:30 PM to Sunday, June 24, 2018 — 5:00 PM EDT

Three-day programing workshop

Dates Times
Friday, June 22, 2018 5:30 p.m. to 8:30 p.m.
Saturday, June 23, 2018 10:00 a.m. to 5:00 p.m.
Sunday, June 24, 2018 10:00 a.m. to 5:00 p.m.
Applications for a three-day programming workshop Programming Workshop for Beginners are open!
Thursday, June 28, 2018 — 2:30 PM EDT

Cecylia Bocovich, PhD candidate
David R. Cheriton School of Computer Science

Circumventing state firewalls! Détournement! Doctor Who references! Now with higher bandwidth!

Friday, June 29, 2018 — 10:00 AM EDT

Michael Cormier, PhD candidate
David R. Cheriton School of Computer Science

Monday, July 9, 2018 — 2:30 PM EDT

Chelsea Komlo, HashiCorp

​Privacy Enhancing Technology communities rely on the research community for help designing and validating protocols, finding potential attack vectors, and applying new technological innovations to existing protocols. However, while the research community has made significant progress studying projects such as Tor, the number of research outcomes that have actually been incorporated into privacy enhancing technologies such as The Tor Project is lower than the number of feasible and useful research outcomes. 

Tuesday, July 10, 2018 — 2:30 PM EDT

Matthew Finkel, The Tor Project

There are hundreds of millions of new "smart" mobile device users every year, but the mobile ecosystem and infrastructure are designed and built for optimizing convenience, not protecting the privacy of the user. From a design flaw in the Internet Protocol to an abundence of physical sensors, a mobile device may tell a third-party more information than the user intended or wanted. 

S M T W T F S
27
28
29
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
  1. 2018 (104)
    1. July (5)
    2. June (12)
    3. May (25)
    4. April (34)
    5. March (24)
    6. February (3)
    7. January (1)
  2. 2017 (37)
    1. December (2)
    2. November (5)
    3. October (3)
    4. September (4)
    5. July (4)
    6. June (3)
    7. May (2)
    8. April (2)
    9. March (6)
    10. February (4)
    11. January (2)
  3. 2016 (21)
  4. 2015 (36)
  5. 2014 (33)
  6. 2013 (23)
  7. 2012 (4)
  8. 2011 (1)
  9. 2010 (1)
  10. 2009 (1)
  11. 2008 (1)