Uncategorized

Sharon Goldberg Wins 2014 Sloan Fellowship

Sharon Goldberg is one of the 2014 Alfred P. Sloan scholars. The Sloan Fellowship scholars represent the most promising scientific researchers working today. Their achievements and potential place them among the next generation of scientific leaders in the U.S. and Canada. Since 1955, Sloan Research Fellows have gone on to win Nobel Prizes, Fields Medals, […]

Charles River Privacy Day

The Charles River Privacy Day will take place on Friday November 15, in the Hariri Institute at Boston University (111 Cummington Mall, MCS 180). There will be four talks covering different aspects of the challenge of protecting privacy of personal information in public databases. The Charles River Privacy Day is co-organized by Ran Canetti, Sharon […]

Privacy Year at BU

The Privacy Year, funded by Penn State, BU’s Hariri Institute, BU’s RISCS, and Harvard’s CRCS, is bringing three top data privacy researchers to BU for AY 2013-14. It will focus on research on data privacy and will include workshops and a seminar series to ensure a wide dissemination of the research results and a dialog […]

Boston Freedom in Online Communications Day (BFOC) 3/8/2013

IT’S SNOWING, BUT BFOC IS STILL ON! The Internet offers great promise for improving the communication capabilities of citizens, but our increasing dependence on networked communications also makes it easier for organizations and governments to control, monitor, and block communications.  The growing trend toward blocking, tampering, or otherwise restricting communications on the Internet calls for […]

IAP Day 2013

Computer Science Research Open House on Friday, March 29, 2013, 9:30AM – 4PM at 111 Cummington Mall, 2nd floor of the MCS Building

Leo Reyzin, Dec 12

Information-Theoretic Key Agreement from Close Secrets: A Survey Speaker: Leo Reyzin Suppose Alice and Bob start with values w and w’, respectively, that are close according to some metric and are partially secret from the adversary. They want to agree on a key that is completely secret, without using any computational assumptions. This problem has […]