PhD Seminar • Bioinformatics — Protein Structure Elastic Network Model Normal Mode Analysis and the Rank 3 Positive Semidefinite Matrix Manifold
Xiao-Bo Li, PhD candidate
David R. Cheriton School of Computer Science
Xiao-Bo Li, PhD candidate
David R. Cheriton School of Computer Science
Xiao-Bo Li, PhD candidate
David R. Cheriton School of Computer Science
Thomas Steinke, Postdoctoral researcher
IBM Almaden Research Center
As data is being more widely collected and used, privacy and statistical validity are becoming increasingly difficult to protect. Sound solutions are needed, as ad hoc approaches have resulted in several high-profile failures.
Chengnian Sun, Software Engineer
Google Inc., Mountain View, USA
Edward Zulkoski, PhD candidate
David R. Cheriton School of Computer Science
Edward Zulkoski, PhD candidate
David R. Cheriton School of Computer Science
Joe Mitchell
Department of Applied Mathematics and Statistics
State University of New York at Stony Brook
Dakshita Khurana, PhD candidate
Department of Computer Science, UCLA
Can we provably immunize protocols against coordinated attacks on the internet? Can we verify that computation is performed correctly while preserving the privacy of underlying data? Can we enable mutually distrusting participants to securely compute on distributed private data?
These are some of the core challenges that lie at the heart of modern cryptography and secure protocol design.
Joel Reardon, Assistant Professor
Department of Computer Science, University of Calgary
Xi He, PhD candidate
Computer Science Department, Duke University