Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.

Similar presentations


Presentation on theme: "1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication."— Presentation transcript:

1 1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication Technology Associate Professor, Wei-Chi Ku Department of Computer Science and Information Engineering Fu Jen Catholic University International Collaboration Project on Information Security

2 2 Outline Goals of the Project Goals of the Project Major Tasks of International Collaboration Major Tasks of International Collaboration Manpower and Budget Expense Manpower and Budget Expense Key Performance Indicators and Review Points Key Performance Indicators and Review Points

3 3 Goals of the Project Study and develop advanced remote authentication techniques. Study and develop advanced remote authentication techniques. Collaborate closely with the CMU CyLAB at a highly technical and theoretical level. Collaborate closely with the CMU CyLAB at a highly technical and theoretical level. Promote Taiwan ’ s industrial research on remote authentication techniques (especially for mobile devices) to strengthen self-reliance in this sector. Promote Taiwan ’ s industrial research on remote authentication techniques (especially for mobile devices) to strengthen self-reliance in this sector. Educate professionals in advanced remote authentication techniques. Educate professionals in advanced remote authentication techniques.

4 4 Int’l Collaboration with CMU CyLAB Prof. Michael Reiter Technical Director of CyLAB. Professor of Electrical & Computer Engineering & Computer Science at CMU. Research Topics: computer and communications security. Editor of ACM Trans. Information and System Security & IEEE Trans. Software Engineering & IEEE Trans. Dependable and Secure Computing. Chair of the IEEE Technical Committee on Security and Privacy for 2002–2003.

5 5 Dr. Dawn Song Assistant Professor of Electrical and Computer Engineering & Computer Science at CMU. Research Topics: applied cryptography, applications of program analysis & model checking & software engineering techniques to computer security. Winner of IBM Faculty Award & National Science Foundation CAREER Award. Offers fundamentally new techniques for defending against large-scale Internet attacks. Int’l Collaboration with CMU CyLAB

6 6 Dr. Adrian Perrig Assistant Professor of Electrical and Computer Engineering & Engineering & Public Policy & Computer Science at CMU. Research Topics: networking and systems security, security for mobile computing and sensor networks, human interfaces for security, and applied cryptography. Int’l Collaboration with CMU CyLAB

7 7 Major Tasks of International Collaboration Plan to visit CMU CyLAB to study (July ~ Sept., 2006) Plan to visit CMU CyLAB to study (July ~ Sept., 2006) advanced remote authentication theory and implementation techniquesadvanced remote authentication theory and implementation techniques strong public-key cryptography for mobile devicesstrong public-key cryptography for mobile devices applications of ubiquitous pervasive computing techniques (e.g., 2D barcodes, camera phones, high-power sensor networks and hidden computer networks) for remote authentication and controlapplications of ubiquitous pervasive computing techniques (e.g., 2D barcodes, camera phones, high-power sensor networks and hidden computer networks) for remote authentication and control

8 8 Major Tasks of International Collaboration maintenance of data security and system robustness under computational and communications constraintsmaintenance of data security and system robustness under computational and communications constraints key protection in the face of widespread device theftkey protection in the face of widespread device theft graphical password based remote authentication techniquesgraphical password based remote authentication techniques

9 9 Major Tasks of International Collaboration Plan to invite Plan to invite Prof. Reiter, Dr. Song and Dr. Perrig to come to Taiwan to give short courses (about one week) in remote authentication theory and implementation techniquesProf. Reiter, Dr. Song and Dr. Perrig to come to Taiwan to give short courses (about one week) in remote authentication theory and implementation techniques Establish collaboration model with CMU CyLAB Establish collaboration model with CMU CyLAB

10 10 Manpower Functional PositionName AffiliationTitle PITzong-Chen Wu Dept. of Information Management National Taiwan University of Science and Technology Professor CO-PIChi-Jen LuInstitute of Information Science Academia Sinica Associate Research Fellow InvestigatorTsan-Sheng Hsu Institute of Information Science Academia Sinica Research Fellow InvestigatorBo-Yin YangDept. of Mathematics Tamkang University Associate Professor InvestigatorWei-Chi KuDept. of Computer Science and Information Engineering Fu Jen Catholic University Associate Professor Full-time Research Assistant (Master Degree One person TBD Part-time Research Assistant (Ph.D Student) Two persons TBD Part-time Research Assistant ( Master Student) four persons TBD

11 11 Budget Expense for the First Year Item ListBudget AmountPercentage 1. Personnel Expense2,041,50051.9% 2. Equipment Expense350,0008.9% 3. Travel Expense ( Int ’ l Conferences, etc.) 500,00012.7% 4. International Collaboration Expense 719,00018.3% 5. Operation Expense324,0008.2% 6. Overhead315,5008% Total Amount4,250,000

12 12 Expected Outcomes – Quantity Aspect 200620072008 Academic Research International conference paper: at least 1 Technical report: at least 1 International journal paper: at least 1 (Impact Factor: > 0.5) International conference paper: at least 1 Technical report: at least 2 International journal paper: at least 1 (Impact Factor: > 0.5) International conference paper: at least 2 Technical report: at least 3 Technology Utilization Patent application : 2 Prototype system:1

13 13 Expected Outcomes – Quality Aspect Academics aspect Academics aspect Increase the capabilities and experiences of Taiwan researchers and graduate students to do international collaborative research.Increase the capabilities and experiences of Taiwan researchers and graduate students to do international collaborative research. Expand research capacity and diversify research directions in advanced remote authentication, versatile security token, and ubiquitous pervasive computing techniques.Expand research capacity and diversify research directions in advanced remote authentication, versatile security token, and ubiquitous pervasive computing techniques. Industry aspect Industry aspect Culminate technical consultants and new products inventors in remote authentication applications area.Culminate technical consultants and new products inventors in remote authentication applications area. Provide training courses and future trend in mobile devices security and highly secure remote authentication techniques to Taiwan ’ s related industry.Provide training courses and future trend in mobile devices security and highly secure remote authentication techniques to Taiwan ’ s related industry.

14 14 Proposed Project Schedule Schedule2006 123456789101112 +: Report generated 1. Collect and analyze related research papers and prototypes XXXX X1X1X1X1X2+XX 2. Invite CMU team to give short course and learn necessary skills X3 3.Send researchers to work with CMU scholars on site XXX4+ 4. Give training courses about low resource mobile devices XXXX 5. Establish collaboration model with CMU CyLAB XXXX5+ Work Complete Percentage( % ) 40 % 80 % 100 %

15 15 Review Points Review Point Proposed Date Finished Work Description 1 May 31 Establish a detailed research plan and working target for the first year. 2 June 30 Complete the research methodology structure. 3 July 31 Complete the short training course 4 Sept. 30 Consolidate the research results through collaboration with CMU and modify prototype design based on new findings. 5 Dec. 31 1.Finalize research results for the first year and write research reports. 2.Complete the design of prototype system.

16 16 Thank you! Q&A


Download ppt "1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication."

Similar presentations


Ads by Google