{"id":3,"date":"2009-04-27T08:54:45","date_gmt":"2009-04-27T12:54:45","guid":{"rendered":"https:\/\/www.bu.edu\/riscs\/home\/"},"modified":"2021-03-17T15:02:24","modified_gmt":"2021-03-17T19:02:24","slug":"home","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/riscs\/","title":{"rendered":""},"content":{"rendered":"<h1 style=\"text-align: center;\">Our Current Areas of Research<\/h1>\n<table class=\" aligncenter\" width=\"1122\" height=\"531\" style=\"height: 608px;\">\n<tbody>\n<tr>\n<td style=\"width: 300px; height: 600px; text-align: center;\"><img loading=\"lazy\" src=\"\/riscs\/files\/2021\/03\/1.png\" alt=\"\" width=\"250\" height=\"250\" class=\"size-full wp-image-2976 aligncenter\" srcset=\"https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/1.png 250w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/1-150x150.png 150w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/1-100x100.png 100w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/><\/p>\n<h4>Cloud Security<\/h4>\n<p>Our research encompasses technologies and controls that protect cloud data and applications from threats.<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/riscs\/research-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">LEARN MORE \u2192<\/a><\/td>\n<td style=\"width: 300px; height: 600px; text-align: center;\"><img loading=\"lazy\" src=\"\/riscs\/files\/2021\/03\/2-2.png\" alt=\"\" width=\"250\" height=\"250\" class=\"wp-image-2975 size-full aligncenter\" srcset=\"https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/2-2.png 250w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/2-2-150x150.png 150w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/2-2-100x100.png 100w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/><\/p>\n<h4>Cryptography<\/h4>\n<p>We study all aspects of cryptography: foundational, algorithmic, and applied.Our research is currently focused on optimized relations auditing and an end-to-end approach to formal privacy.<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/riscs\/research-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">LEARN MORE \u2192<\/a><\/td>\n<td style=\"width: 300px; height: 600px;\"><img loading=\"lazy\" src=\"\/riscs\/files\/2021\/03\/Untitled-design-14.png\" alt=\"\" width=\"250\" height=\"250\" class=\"wp-image-2977 size-full aligncenter\" srcset=\"https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/Untitled-design-14.png 250w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/Untitled-design-14-150x150.png 150w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/Untitled-design-14-100x100.png 100w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/><\/p>\n<h4 style=\"text-align: center;\">Privacy<\/h4>\n<p style=\"text-align: center;\">Our research and collaborative work focus on interactive private data analysis and computation verification.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.bu.edu\/riscs\/research-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">LEARN MORE \u2192<\/a><\/p>\n<\/td>\n<td style=\"width: 300px; height: 600px;\"><img loading=\"lazy\" src=\"\/riscs\/files\/2021\/03\/Untitled-design-17.png\" alt=\"\" width=\"250\" height=\"250\" class=\"aligncenter wp-image-3022 size-full\" srcset=\"https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/Untitled-design-17.png 250w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/Untitled-design-17-150x150.png 150w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/Untitled-design-17-100x100.png 100w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/><\/p>\n<h4 style=\"text-align: center;\">Algorithms &amp; Society<\/h4>\n<p style=\"text-align: center;\">Our research explores new ways in which reliable algorithms and cryptographic tools can be co-developed with public policy and law to further benefit society.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.bu.edu\/riscs\/research-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">LEARN MORE \u2192<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table class=\" aligncenter\" style=\"width: 800px; height: 400px; border-color: #ffffff;\">\n<tbody>\n<tr>\n<td style=\"width: 400px; border-color: #ffffff;\"><img loading=\"lazy\" src=\"\/riscs\/files\/2021\/03\/1-2-300x300.png\" alt=\"\" width=\"400\" height=\"400\" class=\"wp-image-3034 aligncenter\" srcset=\"https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/1-2-300x300.png 300w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/1-2-150x150.png 150w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/1-2-100x100.png 100w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/1-2.png 500w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/td>\n<td style=\"width: 400px; height: 400px; border-color: #ffffff;\"><img loading=\"lazy\" src=\"\/riscs\/files\/2021\/03\/2-4-300x300.png\" alt=\"\" width=\"400\" height=\"400\" class=\"aligncenter wp-image-3033\" srcset=\"https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/2-4-300x300.png 300w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/2-4-150x150.png 150w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/2-4-100x100.png 100w, https:\/\/www.bu.edu\/riscs\/files\/2021\/03\/2-4.png 500w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1><\/h1>\n<p>&nbsp;<\/p>\n<hr \/>\n<h1 style=\"text-align: center;\"><strong>Events<\/strong><\/h1>\n<p style=\"text-align: center;\">RISCS supports and hosts several events throughout the academic calendar. Each event addresses different research areas.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.bu.edu\/riscs\/events\/\" target=\"_blank\" rel=\"noopener noreferrer\">LEARN MORE \u2192<\/a><\/p>\n<div align=\"center\"><\/div>\n<div align=\"center\"><iframe loading=\"lazy\" width=\"800\" height=\"600\" style=\"border: solid 1px #777;\" src=\"https:\/\/calendar.google.com\/calendar\/embed?height=600&amp;wkst=1&amp;bgcolor=%2366cccc&amp;ctz=America%2FNew_York&amp;src=Z204ZTc0bTh1azZtMzFxZGxnMzA5a3UwOGdAZ3JvdXAuY2FsZW5kYXIuZ29vZ2xlLmNvbQ&amp;color=%234285F4&amp;showTitle=0&amp;mode=MONTH&amp;showCalendars=0&amp;showTabs=0&amp;showPrint=0&amp;showDate=1&amp;showNav=1\" frameborder=\"0\" scrolling=\"no\"><span data-mce-type=\"bookmark\" style=\"display: center; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/div>\n<div align=\"center\"><\/div>\n<div align=\"center\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Our Current Areas of Research Cloud Security Our research encompasses technologies and controls that protect cloud data and applications from threats. LEARN MORE \u2192 Cryptography We study all aspects of cryptography: foundational, algorithmic, and applied.Our research is currently focused on optimized relations auditing and an end-to-end approach to formal privacy. LEARN MORE \u2192 Privacy Our [&hellip;]<\/p>\n","protected":false},"author":1433,"featured_media":0,"parent":0,"menu_order":14,"comment_status":"closed","ping_status":"closed","template":"page-templates\/no-sidebars.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/pages\/3"}],"collection":[{"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/users\/1433"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/comments?post=3"}],"version-history":[{"count":50,"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/pages\/3\/revisions"}],"predecessor-version":[{"id":3036,"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/pages\/3\/revisions\/3036"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/riscs\/wp-json\/wp\/v2\/media?parent=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}