Korea-Japan Joint Workshop at KDDI, Tokyo 17.11.2005 IT-Security Researches in Germany and Europe Prof. Tsuyoshi Takagi Future University ‐ Hakodate

Slides:



Advertisements
Similar presentations
PAR for P Title: Standard for Pairing based Cryptographic Techniques June 4, 2005 PAR for IEEE P
Advertisements

Wireless Sensor Networks Studies and experiences at ISMB Torino, Italy Edoardo Calia Human Factors and the Digital Home Workshop ETSI, Sophia.
Information & Communication Technology Labs Magnus Madfors Ericsson, R&D Director EIT ICT Labs Executive Board.
EFICENT Central European Regional Office – EFICENT – Information Event 3rd April 2009 Freiburg Ministerialdirigent Dr. Richard Lammel, Federal Ministry.
Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Location Karlsruhe ▪ HsKA – a green campus in a green city...
Faculty of Computer Science January Department of Computer Science – History 1969 Begin of the Education in Computer Science in Dresden (at the.
Faculty of Computer Science November Department of Computer Science – History 1969 Begin of the Education in Computer Science in Dresden (at the.
Gérard MÉGIE - Rome - November 28, Research in France and the Role of CNRS
Kick-off Meeting Athens 05/10/2004 The project ’POMPEI - P2p, location and presence mobile services for managing crisis and disaster situations’
UNIVERSITY OF JYVÄSKYLÄ Department of Mathematical Information Technology Welcome to 1st International IFIP/WG12.5 (artificial intelligence) Working Conference.
“Software Platform Development for Continuous Monitoring Sensor Networks” Sebastià Galmés and Ramon Puigjaner Dept. of Mathematics and Computer Science.
Berlin, Knowledge by Networking 2007 Scientific Library Services and Information Systems: “Digitisation.
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
Softare software p a r kp a r k p a r kp a r k Hagenberg Bruno Buchberger, PhD Full Professor of Mathematics Initiator and Chairman of the Software Park.
Information Security of Embedded Systems : Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
FAKULTÄT INFORMATIK OUTPUT.DD  research projects  student research projects  ca. 800 visitors  national joint venture  Innovationsforum Students'
Magdeburg-Stendal University of Applied Sciences Studying in green surroundings
FACULTY OF COMPUTER SCIENCE OUTPUT DD  annual event from students for students with contact to industry (~800 visitors)  live demonstrations  research.
Department of Information and Communication Traffic University of Zagreb Faculty of Transport and Traffic Sciences.
ASYMMETRIC CIPHERS.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
1 Requested financing: Building up a European Campus in the Upper Rhine Region Cross-border cooperation in the field of higher education and research Janosch.
Applied Research Center for Computer Networking GENI, we be of one blood.
04/01/08 Conference on Quality of tertiary education and the economic policy prof. dr. Andreja KOCIJANČIČ, Rector April 2008.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Betim Çiço Norbert M. Marx online.de 13 th Workshop on SEERE, Bansko –
The Faculty of Mathematics and Informatics and the IT business in Bulgaria Ivan Soskov Dimitar Birov
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Towards high potential engineers and future managers.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
FACULTY OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY.
Energy efficient sensor networks SRA Ambient Intelligence 2008.
External Review Committee  Chair Prof. Y. Inagaki, University of Nagoya, appointed by our President Prof. H. Harashima, University of Tokyo Prof. S. Tomita,
Agder University Faculty of Engineering and Science ICT Department Head of ICT Department Prof. A. Prinz.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
Participating in IST: Learning from Experience Carlos Salema.
Thoughts on the National Research and Development Center for Cyber Defense Ferenc FRIEDLER University of Pannonia Veszprém, Hungary 3rd Information Security.
Technology for People Vienna University of Technology September 8th, 2014 Welcome 8 th International Workshop on the CKM Unitarity Triangle (CKM2014) Univ.Prof.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
Service Research in Germany and the Karlsruhe Service Research Institute (KSRI) Prof. Dr. Gerhard Satzger Karlsruhe Service Research Institute (KSRI) Opening.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
1 Content IP-SECOQC – Consortium, Funding What is Quantum Cryptography? Project Goals / Project Structure Standard Related Issues: –In Quantum Key Distribution.
TU9 German institutes of technology SEVERAL LOCATIONS TU Berlin, TU Braunschweig, TU Darmstadt, TU Dresden, Leibniz Universität Hannover, Karlsruhe Institute.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
TU DRESDEN THE SYNERGETIC UNIVERSITY Media Center, Media and Information Technology, Editorial Department Thessaloniki, October 2015.
COST as a network instrument: Actions in Sustainable Construction and Energy Efficient Buildings S3 Platform on smart specialisation Workshop “Towards.
Spojujeme software, technologie a služby Company Profile OKsystem Ivo Rosol Development Director
1 Ecologic Institute Science and Policy for a Sustainable World Berlin – Brussels Washington DC – San Mateo CA Ecologic.eu EIUS.org.
German-Japanese Workshop Computational and Systems Neuroscience, Berlin, May 25-28, The Bernstein Network for Computational Neuroscience.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
1 Distributed Multimedia Information Systems and Applications Lab. (TUC/MUSIC) Lab site: Short description:
1 © 2006 Nokia Innovation and Competitiveness ICT Industry Perspective Lauri Kivinen Vice President, Head of Nokia EU Representative Office, Brussels Budapest,
Tempus project No KNOWTS, seminar in Vienna, November 30, 2010 International Office of Vienna University of Technology Peter Gabko TU Wien, International.
“Every human will have a secure access to the Blockchain.”
Department of Computer and Information Sciences
Oxford Internet Institute Dr Eric T. Meyer Research Fellow
Sorin A. Huss - Technische Universität Darmstadt
German-Uzbek STI Cooperation
Title Speaker.
Traditionally innovative
Dahlem Research School – Concept and Strategies
Welcome to the 3rd Stammtisch for female physicists at KIT
“Every human will have a secure access to the Blockchain.”
Computer Science Department
Presentation transcript:

Korea-Japan Joint Workshop at KDDI, Tokyo IT-Security Researches in Germany and Europe Prof. Tsuyoshi Takagi Future University ‐ Hakodate

Korea-Japan Joint Workshop at KDDI, Tokyo IT-Security Institutes in Germany TU Dresden Prof. A. Pfizmann Information Hiding German Telecom Research Center Berlin BMBF (Ministry for Education and Research) Uni-Saarland MaxPlanck Institute DFKI (verification technique) Uni-Bochum, Uni-Essen Prof. C.Paar, Prof. G.Frey (elliptic curve cryptosystem) DFG (German NSF) BSI (German NSA) Uni-Freiburg Prof. Gueter Mueller (network security) Research City Darmstadt TU Munich Verification Technique DymlerCrysler Research Center Uni-Frankurt Prof. C.-P.Schnorr TU Karlsruhe Prof. Thomas Beth PTB (German NIST)

Korea-Japan Joint Workshop at KDDI, Tokyo Research City Darmstadt TU Darmstadt - Prof. J. Buchmann, number fields crypto, post-quantum crypto - Prof. A. May, lattice based cryptosystems - Prof. N. Suri, dependable, embedded systems & software Fraunhofer Institute - Prof. J. Encarnacao, computer graphic, water marking, etc - Prof. C. Eckert, PKI, smart cards, etc. German Telecom Research Center - Dr. Friedrich Toensing, network security, etc

Korea-Japan Joint Workshop at KDDI, Tokyo Industry-Government-Academic Cooperation Universities Fraunhofer, MaxPlack, … German Telecom DymlerCrysler, Siemens, …. TU Darmstdat, Uni-Saarland, … Semi-Governmental Institutes Private Companies Government BMBF (Ministry) DFG (NSF) BSI (NSA) 40~80% Resource FundingProject Oriented Grant 100% Resource Funding Project-Oriented Grants Grants (projects with university) Professors Master/PhD Students Research Projects Applied Projects Researchers Projects Students

Korea-Japan Joint Workshop at KDDI, Tokyo FP6-IST EU Government, 6th Framework Programme Information Societies Technology (FP6-IST) (total budget: 4,000 million Euros) Network of Excellent (7) - European Network of Excellence in Cryptology (ECrypt) - Biometrics for Secure Authentication - The Future of Identity in the Information Society - etc Integrated Project (20) - Security Expert Initiative - Towards a Global Security and Visibility framework for Justice in EU - Integrated Secure Platform for Interactive Personal Devices - etc Specific Targeted Project (34) - Distributed Adaptive Security by Programmable Firewall - Side Channel Analysis Resistant Design Flow - Secure Contracts signed by Telephone - Dependable Distributed Systems - etc

Korea-Japan Joint Workshop at KDDI, Tokyo Academic Career in Germany |||| |||| Old New 2001~ 25~26 29~31 32~35 38~40 40~45 45~50 || Master PhD PostDoc Habilitation Associate Full Professor Professor Faculty Member 25~26 29~31 32~35 38~43 43~50 Master PhD PostDoc Assistant Associate Full Professor Professor Professor | Faculty Member

Korea-Japan Joint Workshop at KDDI, Tokyo Juniorprofessor Same right and obligation as standard professor - lectures, supervising PhD, grant application, professor meetings, secretary, etc Non-Tenure Position (3 years + 3years) - house employment is not allowed

Korea-Japan Joint Workshop at KDDI, Tokyo Main Activities Certificate Authority - Flexi-Provider, CA using Java Formal Security Proof - security proof for high level protocols Side channel attacks - meaningful security modeling Quantum computer - alternative mathematical problems Designs, Codes, and CryptogrpahyIEEE Transactions on ComputersIEICE Transactions on Fundamentals.Journal of CryptogloyCRYPTOEUROCRYPTASIACRYPTPKCCHESACISPACNSICISCICICSINDOCRYPTISC….

Korea-Japan Joint Workshop at KDDI, Tokyo SicAri, BMBF-Project - security analysis of side channel attacks (300,000 Euro, 4 years) Verisoft, BMBF-Project - formal verification of cryptographic protocols (800,000 Euro, 4 years) DFG - public-key cryptosystem for quantum computing age (130,000 Euro, 2 years) Industry Projects - efficient and secure implementation (100,000 Euros) Research Projects

Korea-Japan Joint Workshop at KDDI, Tokyo Future University - Hakodate FUN started in School of System Information Science - Chaos Theory, Information Design, Communication, Humanoid Robotics, Ubiquitous Sensor Network, etc. FUN

Korea-Japan Joint Workshop at KDDI, Tokyo Recent Research Topics PKC over Mobile Phones - software implementation (Java, C) - RSA, elliptic curve cryptosystems - pairing based cryptosystems - side channel attacks Security of Sensor Networks - implementation of PKC over MOTE - detection/elimination of selfish nodes (with Prof. Osamu Takahashi at FUN)

Korea-Japan Joint Workshop at KDDI, Tokyo Small Examples of Selfish Nodes Density GraphRouting 25 ( Low ) There is no rout to reach the left node. 50 ( Mid ) There is a rout to reach the left node. 100 ( High ) There is two different routs to reach the left node.

Korea-Japan Joint Workshop at KDDI, Tokyo An Experiment using Simulator NS-2 Node Number 100 probability throughput [kbps] Prob. (no connection to the left node) Prob. (one extra hop to the left node) ratio of selfish nodes Through put [kbps] Prob. of the above +

Korea-Japan Joint Workshop at KDDI, Tokyo Thank you! Questions?