Security for All: Modeling Structural Inequities to Design More Secure Systems
Users often fall for phishing emails, reuse simple passwords, and fail to effectively utilize “provably” secure systems. These behaviors expose users to significant harm and frustrate industry practitioners and security researchers alike. As consequences of…
Securing the vote with Dr. Josh Benaloh
Episode 65, February 27, 2019 – Dr. Josh Benaloh gives us a brief but fascinating history of elections, explains how the trade-offs among privacy, security and verifiability make the relatively easy math of elections such…
Microsoft SEAL open source homomorphic encryption library gets even better for .NET developers!
Since its open-source release on December 3rd 2018, Microsoft SEAL has become one of the world’s most popular homomorphic encryption libraries and has been adopted by security and privacy professionals world-wide in both academia and…
Are Certificate Thumbprints Unique?
KauwaKaate: A Platform for Fake-news Verification
AI researchers are striving to create intelligent machines that complement human reasoning and enrich human experiences and capabilities. At the core is the ability to harness the explosion of digital data and computational power with…
Panel Discussion: Challenges & Opportunities in AI
AI researchers are striving to create intelligent machines that complement human reasoning and enrich human experiences and capabilities. At the core is the ability to harness the explosion of digital data and computational power with…
Private Multi-party AI
AI researchers are striving to create intelligent machines that complement human reasoning and enrich human experiences and capabilities. At the core is the ability to harness the explosion of digital data and computational power with…