{"588125":{"#nid":"588125","#data":{"type":"event","title":"Cybersecurity Lecture Series - Shan Chen","body":[{"value":"\u003Ch3\u003E\u003Cstrong\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies. \u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EThe \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Apr. 21,\u003C\/strong\u003E lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EComplimentary lunch provided for registered guests. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003ESign up to receive future lecture announcements.\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Ch3\u003E\u0026nbsp;\u003C\/h3\u003E\r\n\r\n\u003Ch3\u003E\u003Cstrong\u003EFeaturing Shan Chen on Mar. 10, 2017\u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Ch4\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;Human Computing for Handling Strong Corruptions in Authenticated Key Exchange\u0026quot;\u003C\/em\u003E\u003C\/strong\u003E\u003Cem\u003E\u003Cstrong\u003E \u003C\/strong\u003E\u003C\/em\u003E\u003C\/h4\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/register-cybersecurity-lecture-series-mar-10\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ERSVP\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EABSTRACT\u003C\/em\u003E\u003C\/strong\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols and propose two generic protocols based on human-compatible (HC) functions, password-authenticated key exchange (PAKE), commitment, and authenticated encryption. Chen will prove that HAKE protocols can remain secure under reasonable assumptions and will discuss efficient instantiations. He\u0026#39;ll also propose a variant where users get help from a small device such as RSA SecurID. This allows implementation of an HC function with stronger security and weakens required assumptions on the PAKE. Overall, this leads to the very efficient HAKE, which can withstand strong corruptions.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EBIO\u003C\/em\u003E\u003C\/strong\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; \u003Cstrong\u003EShan Chen\u003C\/strong\u003E is a Ph.D. student in the School of Computer Science at the Georgia Institute of Technology. His research interests are in the areas of cryptography and applied cryptography.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions."}],"uid":"27490","created_gmt":"2017-02-28 22:15:24","changed_gmt":"2017-04-13 21:12:35","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-03-10T12:00:00-05:00","event_time_end":"2017-03-10T13:00:00-05:00","event_time_end_last":"2017-03-10T13:00:00-05:00","gmt_time_start":"2017-03-10 17:00:00","gmt_time_end":"2017-03-10 18:00:00","gmt_time_end_last":"2017-03-10 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=tTPdUlNC"}}},"media_ids":["538461"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELindsey Panetta, \u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}