Merge branch 'master' of caffeine:/users/www/www/

This commit is contained in:
David Bartley 2007-10-05 02:28:36 -04:00
commit 7481af1666
1 changed files with 43 additions and 5 deletions

View File

@ -47,7 +47,7 @@ programming with F#, Web Crawlers with F#, and OpenGL/GTK programming with OCaml
be.</p>
</abstract>
</eventitem>
<eventitem date="2007-10-09" time="4:30 PM" room="TBA" title="Join-Calculus with JoCaml. Concurrent programming that doesn't fry your brain.">
<eventitem date="2007-10-09" time="4:45 PM" room="MC 4060" title="Join-Calculus with JoCaml. Concurrent programming that doesn't fry your brain.">
<short>Brennan Taylor</short>
<abstract>
<p>
@ -60,17 +60,55 @@ focuses on how easy concurrent programming can be.
</p>
</abstract>
</eventitem>
<eventitem date="2007-10-16" time="4:30 PM" room="TBA" title="Genetic Algorithms in Haskell">
<eventitem date="2007-10-15" time="4:30 PM" room="MC4041" title="Off-the-Record Messaging: Useful Security and Privacy for IM">
<short>Ian Goldberg</short>
<abstract>
<p>
Instant messaging (IM) is an increasingly popular mode of communication
on the Internet. Although it is used for personal and private
conversations, it is not at all a private medium. Not only are all of
the messages unencrypted and unauthenticated, but they are all
routedthrough a central server, forming a convenient interception point
for an attacker. Users would benefit from being able to have truly
private conversations over IM, combining the features of encryption,
authentication, deniability, and forward secrecy, while working within
their existing IM infrastructure.
</p>
<p>
In this talk, I will discuss "Off-the-Record Messaging" (OTR), a widely
used software tool for secure and private instant messaging. I will
outline the properties of Useful Security and Privacy Technologies that
motivated OTR's design, compare it to other IM security mechanisms, and
talk about its ongoing development directions.
</p>
<p>
Ian Goldberg is an Assistant Professor of Computer Science at the
University of Waterloo, where he is a founding member of the
Cryptography, Security, and Privacy (CrySP) research group. He holds a
Ph.D. from the University of California, Berkeley, where he discovered
serious weaknesses in a number of widely deployed security systems,
including those used by cellular phones and wireless networks. He also
studied systems for protecting the personal privacy of Internet users,
which led to his role as Chief Scientist at Zero-Knowledge Systems (now
known as Radialpoint), where he commercialized his research as the
Freedom Network.
</p>
</abstract>
</eventitem>
<eventitem date="2007-10-16" time="4:30 PM" room="MC 2054" title="Genetic Algorithms in Haskell">
<short>Andrei Barbu</short>
<abstract>
</abstract>
</eventitem>
<eventitem date="2007-10-18" time="4:30 PM" room="TBA" title="TBA">
<eventitem date="2007-10-18" time="4:30 PM" room="MC 2038" title="TBA">
<short>Sarah Fortune</short>
<abstract>
</abstract>
</eventitem>
<eventitem date="2007-10-23" time="4:30 PM" room="TBA" title="Distributed Programming with Erlang">
<eventitem date="2007-10-23" time="4:30 PM" room="MC 2054" title="Distributed Programming with Erlang">
<short>Brennan Taylor</short>
<abstract>
<p>
@ -81,7 +119,7 @@ operating on a cluster.
</p>
</abstract>
</eventitem>
<eventitem date="2007-10-30" time="4:30 PM" room="TBA" title="An overview of the CSC Computing Enviroment">
<eventitem date="2007-10-30" time="4:30 PM" room="MC 2054" title="An overview of the CSC Computing Enviroment">
<short>David Tenty</short>
<abstract>
<p>