The 2010 Lectures in Computer Science: Network and Information Security


Network and Information Security (NIS) has emerged as a fundamental aspect of Information and Communication Technologies (ICT). Security, resilience, availability and reliability of communication networks and information systems are vital to global economic stability and development, public welfare and national security.

The security of networked systems through traditional computing devices has been evolving into a specialised topic for more than two decades. The increasing use of mobile devices, whose numbers have superseded that of wired ones, create new information security threats and pose new challenges. Mobile users, like internet users, are plagued by malware, spam, phishing, and other malicious activities, whereas mobile networks appear to be an alternative attractive route for attacks.

At the same time, future ICT technologies, like the concepts of Future Internet, Ambient Intelligence and Internet of Things, provide a vision of the Information Society where the emphasis is on surrounding people by intelligent interactive objects and interfaces and on environments that are capable of recognising and reacting to the presence of different individuals in a seamless, unobtrusive and invisible manner.

The Success of future ICT technologies, some of which are set as key priorities for future sustainable development and growth by worldwide leading economies, will depend on how secure will be made, how privacy and individuals' rights will be protected, and how individuals will come to trust the intelligent world that will surround them and through which they will move.

Following the success and experience of the past decade, the 2010 ONASSIS FOUNDATION SCIENCE LECTURE SERIES IN COMPUTER SCIENCE will focus this year on Network and Information Security and cover topics ranging from cryptographic mechanisms, algorithms and protocols to NIS applications and services that address academic, research and policy issues, as well as new developments in this emerging world.

Adi Shamir (Keynote Lecturer)
Professor, The Weizmann Institute of Science, Israel
Turing Award (2002)

Alessandro Acquisti
Assoc. Professor, Carnegie Mellon University, USA

Steven Bellovin
Professor, Columbia University, USA

Kenny Paterson
Professor, Royal Holloway University of London, UK

Bart Preneel
Professor, Katholieke Universiteit Leuven, Belgium

George Spanoudakis
Professor, City University London, UK

Udo Helmbrecht (Guest Lecturer)
Dr., Executive Director,
European Network and Information Security Agency-ENISA, EU

Socrates Katsikas (Guest Lecturer)
Professor, University of Piraeus, Greece
Monday 28 June 09:00 - 09:30R e g i s t r a t i o n
09:30 - 09:45Welcome speech by Prof. Constantine Stephanidis
Director of FORTH-ICS, GR
09:45 - 11:00 "Random Graphs in Cryptography"
Prof. Adi Shamir
The Weizmann Institute of Science, IL
11:00 - 11:30C o f f e e   B r e a k
11:30 - 12:45 "How to Exploit a Small Cryptographic Leakage"
Prof. Adi Shamir
The Weizmann Institute of Science, IL
12:45 - 14:00L u n c h   B r e a k
14:00 - 15:15 "Identity, Security, and Privacy"
Prof. Steven Bellovin
Columbia University, USA
15:15 - 15:45C o f f e e   B r e a k
15:45 - 17:00 "The Cybersecurity Challenge"
Prof. Steven Bellovin
Columbia University, USA
Tuesday 29 June09:30 - 10:45 "Diagnosing the genuineness of events in runtime monitoring of security and dependability"
Prof. George Spanoudakis
City University London, UK
10:45-11:15C o f f e e   B r e a k
11:15 - 12:30 "Runtime prediction of security and dependability threats: The EVEREST framework"
Prof. George Spanoudakis
City University London, UK
12:30 - 14:00L u n c h  B r e a k
14:00 - 15:15 "Introduction to Provable Security for Symmetric Key Cryptography"
Prof. Kenny Paterson
Royal Holloway University of London, UK
15:15 - 15:45C o f f e e   B r e a k
15:45 - 17:00 "Using Symmetric Key Cryptography to Build Secure Channels"
Prof. Kenny Paterson
Royal Holloway University of London, UK
Wednesday 30 June09:30 - 10:45 The cryptographic hash function crisis and the SHA-3 competition"
Prof. Bart Preneel
Katholieke Universiteit Leuven, BE
10:45 - 11:15C o f f e e   B r e a k
11:15 - 12:30 "Identity management and privacy"
Prof. Bart Preneel
Katholieke Universiteit Leuven, BE
12:30 - 14:00L u n c h   B r e a k
20:00 "How Cryptosystems Are Really Broken"
Public Lecture by Prof. Adi Shamir
Thursday 1 July09:30 - 10:45 "Security & Privacy on the Mobile Internet - Part I"
Dr. Udo Helmbrecht
Executive Director of ENISA, EU
10:45 - 11:15C o f f e e   B r e a k
11:15 - 12:30 "Security & Privacy on the Mobile Internet - Part II"
Dr. Udo Helmbrecht
Executive Director of ENISA, EU
12:30 - 14:00L u n c h   B r e a k
14:00 - 15:15 "Intrusion Detection Systems"
Prof. Socrates Katsikas
University of Piraeus, GR
15:15 - 15:45C o f f e e   B r e a k
Friday 2 July09:30 - 10:45 "The Economics of Privacy"
Prof. Alessandro Acquisti
Carnegie Mellon University, USA
10:45 - 11:15C o f f e e   B r e a k
11:15 - 12:30 "Privacy, Behavioral Economics, and the IIIusion of Control"
Prof. Alessandro Acquisti
Carnegie Mellon University, USA
12:30 - 14:00L u n c h   B r e a k
14:00 - 14:15Closing Remarks
This text will be replaced