Securing Cyberspace Tutorials - IPAM

Schedule

All times in this Schedule are Pacific Time (PT)

Tuesday, September 12, 2006

Morning Session

08:00-08:45
Check-In/Light Breakfast (Hosted by IPAM)
08:45-09:00
Welcome and Opening Remarks
09:00-10:00
Dan Boneh (Stanford University)
Pairing-based Cryptography
10:00-10:15
Break
10:15-11:00
Dan Boneh (Stanford University)
Pairing-based Cryptography
11:00-11:15
Break
11:15-12:00
Dan Boneh (Stanford University)
Pairing-based Cryptography

Afternoon Session

12:00-14:00
Lunch (on your own)
14:00-15:00
Panel Discussion
15:00-15:15
Break
15:15-16:00
Panel Discussion
16:00-16:15
Break
16:15-17:00
Panel Discussion

Wednesday, September 13, 2006

Morning Session

08:00-09:00
Breakfast (Hosted by IPAM)
09:00-10:00
10:00-10:15
Break
10:15-11:00
11:00-11:15
Break
11:15-12:00

Afternoon Session

12:00-14:00
Lunch (on your own)
14:00-15:00
Rafail Ostrovsky (University of California, Los Angeles (UCLA))
A survey on Private Information Retrieval
15:00-15:15
Break
15:15-16:00
Rafail Ostrovsky (University of California, Los Angeles (UCLA))
A survey on Private Information Retrieval
16:00-16:15
Break
16:15-17:00
Rafail Ostrovsky (University of California, Los Angeles (UCLA))
A survey on Private Information Retrieval
17:00-18:30
Reception (Location: IPAM Lobby)

Thursday, September 14, 2006

Morning Session

08:00-09:00
Breakfast (Hosted by IPAM)
09:00-10:00
Kobbi Nissim (Ben Gurion University of the Negev)
Database Privacy
10:00-10:15
Break
10:15-11:00
Kobbi Nissim (Ben Gurion University of the Negev)
Database Privacy
11:00-11:15
Break
11:15-12:00
Kobbi Nissim (Ben Gurion University of the Negev)
Database Privacy

Afternoon Session

12:00-13:30
Lunch (on your own)
14:00-15:00
Yuval Ishai (Technion - Israel Institute of Technology)
Randomization techniques and parallel cryptography
15:00-15:15
Break
15:15-16:00
Yuval Ishai (Technion - Israel Institute of Technology)
Randomization techniques and parallel cryptography
16:00-16:15
Break
16:15-17:00
Yuval Ishai (Technion - Israel Institute of Technology)
Randomization techniques and parallel cryptography