1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.

Slides:



Advertisements
Similar presentations
ENERGY ENGINEERING MASTERS DEGREE. Why a Consortium? Great problems are solved with high performance equipment. We celebrate that eight leader companies.
Advertisements

Assessment Report Computer Science School of Science and Mathematics Kad Lakshmanan Chair Sandeep R. Mitra Assessment Coordinator.
Graduate Research Support Program (GRSP). 2 Content of the presentation 1.Introduction 2.Objectives of the program 3.Expected Outcomes 4.Target groups.
Engineering Education in Saudi Arabia: Problems and Solutions
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
City University of Hong Kong Master of Science in Electronic Commerce Department of Computer Science Department of Information Systems Information Session:
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Cyber Education Project Accreditation Committee November 2014.
FAMU ASSESSMENT PLAN PhD Degree Program in Entomology Dr. Lambert Kanga / CESTA.
1 Dr. Sangam Shrestha Asst. Professor, Asian Institute of Technology (AIT) / Research Fellow, Institute for Global Environmental Strategies (IGES) International.
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
NTUST National Taiwan University of Science and Technology 2009 School of Management.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2004.
University of Kansas Models for Joint University/Industry Collaborations Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and.
City University of Hong Kong Master of Science in Electronic Commerce Department of Computer Science Department of Information Systems Information Session:
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
1 Education for Industry The Structure and Practices of the School of Computing Dr Bing Wu BSc MSc PhD School of Computing.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Transmission & Distribution
Katherine Eriksen, Assistant Director of Career Services The Graduate College University of Illinois at Urbana-Champaign.
Learning Sciences and Engineering Professional Master’s Program Ken Koedinger Vincent Aleven Albert Corbett Carolyn Rosé Justine Cassell.
Comparing Capacity Building Frameworks for Computer Science Education in Underdeveloped Countries: An African and Asian Perspective Jandelyn PlaneIsabella.
1 NATIONAL TECHNICAL UNIVERSITY OF ATHENS (NTUA) School of Chemical Engineering Unit of Environmental Science and Technology (UEST) Katherine Haralambous.
FACULTY OF ELECTRICAL ENGINEERING DEPT. OF TELECOMMUNICATION ENGINEERING CZECH TECHNICAL UNIVERSITY IN PRAGUE ITU Centre of the Czech Technical.
IEEE Systems Council VP Technical Operations Status; April 9, 2010 ieeesystemscouncil.org The SC has established a distinguished lecturer program. AESS.
Department of Electrical Engineering, Southern Taiwan University of Science and Technology Chi-Jo Wang Professor and Associate Chair December 17, 2012.
Region 1 Senior Member Elevation Program Concurrent with the Region 1 Board of Governor’s Meeting August 18, 2012 Harold Belson IEEE A & A Committee Member.
CSE ACCREDITATION REVIEW BY CAC & EAC UC Irvine October 2, 2013.
External Review Committee  Chair Prof. Y. Inagaki, University of Nagoya, appointed by our President Prof. H. Harashima, University of Tokyo Prof. S. Tomita,
Distinguished Talk Prof. Reza Iravani, Editor-in-Chief (IEEE Trans. Power Delivery) IEEE Fellow Dept. of ECE, University of Toronto On November 30, 2010.
Learning by Doing (LBD) based Course Content Development (in Areas of CS and ECE) International Institute of Information Technology Hyderabad, India 1.
頁:頁: National Kaohsiung First University of Science and Technology, Taiwan, R.O.C. 1 Introduction to Fall 2005 「 Industry Research Master Degree Program.
KFUPM-COE Industrial Advisory Council Meeting 31/5/ Department of Computer Engineering (COE) College of Computer Sciences and Engineering (CCSE)
KIGALI INSTITUTE OF SCIENCE AND TECHNOLOGY Prepared by KIST Team 23rd,Nov
The Balance Between Theoretical and Practical Work Within Electrical and Computer Engineering Courses Dr. Bahawodin Baha March Development Partnerships.
WHAT YOU SHOULD EXPECT FROM YOUR EVALUATOR: PROMISING PRACTICAL PRACTICES July 28, 2011 Hi-TEC Conference, San Francisco.
Promoting ICT in Developing Regions Love Ekenberg Professor of Computer Science Acting Director SPIDER Dept. of Computer and Systems Sciences Stockholm.
Computer Sciences at NYU Open House January 2004 l Graduate Study at New York University l The MS in Computer Sciences l The MS in Information Systems.
Comparing Capacity Building Frameworks for Computer Science Education in Underdeveloped Countries: An African and Asian Perspective Jandelyn PlaneIsabella.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
OMICS International welcomes submissions that are original and technically so as to serve both the developing world and developed countries in the best.
Standards Education 18 March 2009 Steve Mills, Chair, SEC Standards Board Forum.
HISTORY With the establishment of Karabük University at 2007, Graduate School of Natural and Applied Sciences has started its education life with 8 graduate.
TRC Research Project (Student) Faculty Mentored Undergraduate Research Award Program (FURAP)
When Mobile Multimedia Meet Cloud: Challenges and Future Directions Prof. Changwen Chen IEEE Fellow and SPIE Fellow State University of New York at Buffalo,
Admit Day CSE Schedule Welcome and Overview (10:45-11:00)  Geoff Voelker, CSE Assistant Professor  Student panel CSE Building Visit (11:35) 
2007. Faculty of Education ► Staff 300 (incl.100 in Teacher training school) ► 20 professorships ► 80 lecturers ► 9 senior assistants ► 12 assistants.
Industry Advisory Board May 29 th, 2015
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
Perkins End of Year Evaluation Wayne Community College.
Surprising and Not So Surprising Similarities and Differences 1 Richard E. Klabunde, Ph.D. Department of Biomedical Sciences Ohio University College of.
Perkins End of Year Evaluation Rowan Cabarrus Community College.
Support National Social Protection Strategy (NSPS) CARD/SPCU 1.
Study Plan Introduction 單元一 : 表達學習領域興趣 ( 範 例 ) During my upcoming graduate studies, I look forward to absorbing enormous amounts of new information that.
1 Item 1 - Security technologies and applications of wireless sensor networks Chin-Laung Lei Department of Electrical Engineering National Taiwan University.
Item 2 - Information Security and Privacy Protection Technology in RFID Applications Nai-Wei Lo Assistant Professor Department of Information Management.
Admit Day CSE Schedule Welcome and Overview (11:15-11:35)  Geoff Voelker, CSE Assistant Professor Meet the Department (11:40-12:05)  CSE Student.
Technical Operations Report Board of Governors Meeting May 7-9, 2015
1st Steering Committee Meeting activities from WP3 –
International Journal of Sensor Networks and Data Communications
Partnership with industry in the Computer Science and Information Security education Elvinia Riccobene Department of Computer Science Università degli.
Faculty of Computer and Information Science
MCS Master of Computer Science Program
Ranking Parameters of Universities in Pakistan HEC Perspective
International Collaboration Project on Information Security
Chung-Kuan Cheng Position:
NordSecMob Master’s Programme in Security and Mobile Computing
Computer Science Section
Sensing Object Semantics for Interactive Multimedia Applications
Technical and Advisory Meeting
Presentation transcript:

1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication Technology Associate Professor, Wei-Chi Ku Department of Computer Science and Information Engineering Fu Jen Catholic University International Collaboration Project on Information Security

2 Outline Goals of the Project Goals of the Project Major Tasks of International Collaboration Major Tasks of International Collaboration Manpower and Budget Expense Manpower and Budget Expense Key Performance Indicators and Review Points Key Performance Indicators and Review Points

3 Goals of the Project Study and develop advanced remote authentication techniques. Study and develop advanced remote authentication techniques. Collaborate closely with the CMU CyLAB at a highly technical and theoretical level. Collaborate closely with the CMU CyLAB at a highly technical and theoretical level. Promote Taiwan ’ s industrial research on remote authentication techniques (especially for mobile devices) to strengthen self-reliance in this sector. Promote Taiwan ’ s industrial research on remote authentication techniques (especially for mobile devices) to strengthen self-reliance in this sector. Educate professionals in advanced remote authentication techniques. Educate professionals in advanced remote authentication techniques.

4 Int’l Collaboration with CMU CyLAB Prof. Michael Reiter Technical Director of CyLAB. Professor of Electrical & Computer Engineering & Computer Science at CMU. Research Topics: computer and communications security. Editor of ACM Trans. Information and System Security & IEEE Trans. Software Engineering & IEEE Trans. Dependable and Secure Computing. Chair of the IEEE Technical Committee on Security and Privacy for 2002–2003.

5 Dr. Dawn Song Assistant Professor of Electrical and Computer Engineering & Computer Science at CMU. Research Topics: applied cryptography, applications of program analysis & model checking & software engineering techniques to computer security. Winner of IBM Faculty Award & National Science Foundation CAREER Award. Offers fundamentally new techniques for defending against large-scale Internet attacks. Int’l Collaboration with CMU CyLAB

6 Dr. Adrian Perrig Assistant Professor of Electrical and Computer Engineering & Engineering & Public Policy & Computer Science at CMU. Research Topics: networking and systems security, security for mobile computing and sensor networks, human interfaces for security, and applied cryptography. Int’l Collaboration with CMU CyLAB

7 Major Tasks of International Collaboration Plan to visit CMU CyLAB to study (July ~ Sept., 2006) Plan to visit CMU CyLAB to study (July ~ Sept., 2006) advanced remote authentication theory and implementation techniquesadvanced remote authentication theory and implementation techniques strong public-key cryptography for mobile devicesstrong public-key cryptography for mobile devices applications of ubiquitous pervasive computing techniques (e.g., 2D barcodes, camera phones, high-power sensor networks and hidden computer networks) for remote authentication and controlapplications of ubiquitous pervasive computing techniques (e.g., 2D barcodes, camera phones, high-power sensor networks and hidden computer networks) for remote authentication and control

8 Major Tasks of International Collaboration maintenance of data security and system robustness under computational and communications constraintsmaintenance of data security and system robustness under computational and communications constraints key protection in the face of widespread device theftkey protection in the face of widespread device theft graphical password based remote authentication techniquesgraphical password based remote authentication techniques

9 Major Tasks of International Collaboration Plan to invite Plan to invite Prof. Reiter, Dr. Song and Dr. Perrig to come to Taiwan to give short courses (about one week) in remote authentication theory and implementation techniquesProf. Reiter, Dr. Song and Dr. Perrig to come to Taiwan to give short courses (about one week) in remote authentication theory and implementation techniques Establish collaboration model with CMU CyLAB Establish collaboration model with CMU CyLAB

10 Manpower Functional PositionName AffiliationTitle PITzong-Chen Wu Dept. of Information Management National Taiwan University of Science and Technology Professor CO-PIChi-Jen LuInstitute of Information Science Academia Sinica Associate Research Fellow InvestigatorTsan-Sheng Hsu Institute of Information Science Academia Sinica Research Fellow InvestigatorBo-Yin YangDept. of Mathematics Tamkang University Associate Professor InvestigatorWei-Chi KuDept. of Computer Science and Information Engineering Fu Jen Catholic University Associate Professor Full-time Research Assistant (Master Degree One person TBD Part-time Research Assistant (Ph.D Student) Two persons TBD Part-time Research Assistant ( Master Student) four persons TBD

11 Budget Expense for the First Year Item ListBudget AmountPercentage 1. Personnel Expense2,041, % 2. Equipment Expense350,0008.9% 3. Travel Expense ( Int ’ l Conferences, etc.) 500, % 4. International Collaboration Expense 719, % 5. Operation Expense324,0008.2% 6. Overhead315,5008% Total Amount4,250,000

12 Expected Outcomes – Quantity Aspect Academic Research International conference paper: at least 1 Technical report: at least 1 International journal paper: at least 1 (Impact Factor: > 0.5) International conference paper: at least 1 Technical report: at least 2 International journal paper: at least 1 (Impact Factor: > 0.5) International conference paper: at least 2 Technical report: at least 3 Technology Utilization Patent application : 2 Prototype system:1

13 Expected Outcomes – Quality Aspect Academics aspect Academics aspect Increase the capabilities and experiences of Taiwan researchers and graduate students to do international collaborative research.Increase the capabilities and experiences of Taiwan researchers and graduate students to do international collaborative research. Expand research capacity and diversify research directions in advanced remote authentication, versatile security token, and ubiquitous pervasive computing techniques.Expand research capacity and diversify research directions in advanced remote authentication, versatile security token, and ubiquitous pervasive computing techniques. Industry aspect Industry aspect Culminate technical consultants and new products inventors in remote authentication applications area.Culminate technical consultants and new products inventors in remote authentication applications area. Provide training courses and future trend in mobile devices security and highly secure remote authentication techniques to Taiwan ’ s related industry.Provide training courses and future trend in mobile devices security and highly secure remote authentication techniques to Taiwan ’ s related industry.

14 Proposed Project Schedule Schedule : Report generated 1. Collect and analyze related research papers and prototypes XXXX X1X1X1X1X2+XX 2. Invite CMU team to give short course and learn necessary skills X3 3.Send researchers to work with CMU scholars on site XXX4+ 4. Give training courses about low resource mobile devices XXXX 5. Establish collaboration model with CMU CyLAB XXXX5+ Work Complete Percentage( % ) 40 % 80 % 100 %

15 Review Points Review Point Proposed Date Finished Work Description 1 May 31 Establish a detailed research plan and working target for the first year. 2 June 30 Complete the research methodology structure. 3 July 31 Complete the short training course 4 Sept. 30 Consolidate the research results through collaboration with CMU and modify prototype design based on new findings. 5 Dec Finalize research results for the first year and write research reports. 2.Complete the design of prototype system.

16 Thank you! Q&A