PhD Seminar • Systems and Networking — Melmint: Truly Decentralized Stablecoins
Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science
Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science
Crispin Cowan, Leviathan Security Group
Privacy, especially anonymity, is tricky, because you don’t want to trust anyone, lest your identity leak, but you must trust someone, or else you cannot communicate. Threat modeling is rarely used in privacy, instead most used for prioritizing security hardening efforts.
Joan Bartlett, School of Information Studies
McGill University
Chendi Ni, PhD candidate
David R. Cheriton School of Computer Science
Bundit Laekhanukit, Institute for Theoretical Computer Science
Shanghai University of Finance and Economics
Mike Schaekermann, PhD candidate
David R. Cheriton School of Computer Science
Yakov Nekrich, Department of Computer Science
Michigan Technological University
Chris Eliasmith, Director of the Centre for Theoretical Neuroscience
Department of Systems Design Engineering
Marcia Lucena, Departamento de Informática e Matemática Aplicada
Universidade Federal do Rio Grande do Norte, Brazil
Mirela Ben-Chen, Center for Graphics and Geometric Computing
Computer Science Department, Technion