Hi All,
Can any one tell me , who is prof. sivkumar, and about what he is going to speak, Also this lecture will b carried out.
A small question ?-- Are all functions of our group are arranged at far flung places like mankhurd, iits very difficult for people living in western suburbs and working to come down there to attend such activities.
Ank heere
--- nagarjun@hbcse.tifr.res.in wrote:
Some of you may be interested in attending the seminar Prof. Sivakumar.
Nagarjuna
----- Forwarded message from ASET Forum aset@tifr.res.in -----
Date: Wed, 16 Apr 2003 13:52:25 +0530 (IST) From: ASET Forum aset@tifr.res.in Subject: Next ASET talk To: Nagarjuna nagarjun@hbcse.tifr.res.in, S Ananthakrishnan ananth@ncra.tifr.res.in
Please publicise. Thanks.
With regards,
B.Satyanarayana, Coordinator, ASET Forum.
- From:
---------------------------------------------------+
| ASET Forum, TIFR, Colaba, Mumbai, INDIA, 400 005
|
| Tel : +91 22 2215 2971 Ext: 2928 Fax: +91 22
2215 2110 |
| Mai : aset@tifr.res.in Web:
www.tifr.res.in/~aset |
+----------------------------------------------------------+
Title : Cryptographic Protocols and Internet
Security
Speaker : Prof. G. Sivakumar, Computer Science
Department
Indian Institute of Technology, Mumbai siva@cse.iitb.ac.in,
http://www.cse.iitb.ac.in/~siva
Date : Friday, April 25, 2003 Time : 1600 hours Venue : AG-66 Abstract:
We will start with an overview of Internet
security requirements (such as
privacy, integrty, authenticity), threats
(sniffing, spoofing, denialof
services) and vulnerabilities (virus, Trojan
Horse, buffer overflows).
We will then separate the three main components of
security--- Data
security, System security and Transmission/Network
Security and present
useful defence mechanisms used at each layer. At
the heart of most defence
mechanisms are Cryptographic protocols, which are
security related
interactions for reaching agreement between two or
more principals, for
example for authentication and key distribution.
Such protocols are
usually described by alternate transmission and
receipt of (encrypted)
messages in pre-defined format and sequence
between principals. We will
conclude by introducing several logics that have
been proposed to model
cryptographic protocols and corresponding proof
techniques used to prove
properties of the protocol such as vulnerability
to attack by interception
or spoofing of messages.
----- End forwarded message -----
--
------------------------------------------------------------------------
nagarjun@hbcse.tifr.res.in www.hbcse.tifr.res.in/gn/ Key fingerprint = C1E2 1B8C 8E98 A697 68B7 ADAC E956 6D4B DE90 BF01
--
__________________________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo http://search.yahoo.com