<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">
Dear all,
<div class=""><span class="Apple-tab-span" style="white-space:pre"></span>these talks happening this morning may be of your interest</div>
<div class=""><br class="">
</div>
<div class="">Andrea<br class="">
<div><br class="">
<blockquote type="cite" class="">
<div class="">
<div class="WordSection1" style="page: WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;">
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class="">Dear All<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class="">I would like to invite you to attend the presentations for the Cyber Security Lecturer position on Thursday 17<sup class="">th</sup><span class="Apple-converted-space"> </span>May 2018 from 11am to 13:00pm in B53 Room
4025 (Mountbatten Seminar Room). Presentation abstract and Bio for candidates are below:<span class="Apple-converted-space"> </span><o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class="">Dr Jassim Happa – 11:00-11:30am<o:p class=""></o:p></span></b></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class="">Bio:</span></b><span style="font-size: 10pt;" class=""><span class="Apple-converted-space"> </span>Jassim Happa is a Research Fellow in the Dept. of Computer Science at the University of Oxford. His research
interests include: Computer Graphics, Cyber Security, Human Factors, Resilience, Rendering, Virtual Archaeology and Visual Analytics. He obtained his BSc (Hons) in Computing Science at the University of East Anglia in 2006. After a year of working as an Intrusion
Detection System (IDS) analyst in the Royal Norwegian Navy, he began his PhD in Engineering at the University of Warwick in October 2007 where he developed a number of novel computer graphics techniques to study heritage sites today. He defended his PhD in
January 2012, and has since December 2011 worked at Oxford. In more recent years he has spent his research efforts on cybersecurity analytics through visualization, covering topics such as threat modelling, situational awareness, risk propagation, resilience,
decision support, privacy as well as cyber threat intelligence sharing. In his research projects he has been responsible for creating, implementing and evaluating novel visualization techniques for cybersecurity applications. Teaching wise, he tutors and lectures
the Computer Graphics and Physically-based Rendering courses at Oxford. He also lectures doctoral students for the Centre for Doctoral Training (CDT) in Cyber Security in topics such as situational awareness, intrusion detection and security architecture.
Finally, he has until now supervised 35+ student dissertation projects at undergraduates, MSc and doctoral level in topics related to cybersecurity data visualization, insider-threat detection, procedural modelling (plants, cities, planets and landscapes),
human-computer interaction (motion gesture technologies).<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class="">Dr Federico Lombardi – 11:30 -12pm<o:p class=""></o:p></span></b></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></b></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class="">Presentation Abstract:<span class="Apple-converted-space"> </span></span></b><span style="font-size: 10pt;" class="">Nowadays, we are witnessing an ongoing trend towards the automation of several processes
which involves multiple parties. Solutions based on a trusted third party have drawbacks due to trustworthiness and single point of failure. Thanks to decentralisation properties, blockchain may addresses such issues, but its poor performances hinder an application
on some real-world scenarios.<b class=""><o:p class=""></o:p></b></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class="">This research aims to evaluate the tradeoff between security, performances and scalability of blockchain-based systems. A layered architecture is proposed to improve performances, then, consensus protocols are discussed
to evaluate their impact on both security and performance, and finally, some directions are proposed to address scalability issues.<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class="">Bio:<span class="Apple-converted-space"> </span></span></b><span style="font-size: 10pt;" class="">Federico Lombardi is a Research Fellow on cybersecurity at University of Southampton. He obtained his PhD
at Sapienza University of Rome achieving the Minerva Award as one of the top 12 PhD candidates of Sapienza for the academic year 2017. His work addresses security, performance and scalability issues of distributed systems. Currently his main research moves
along multi-party systems, investigating solutions to improve blockchain and IoT systems.<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class="">Dr Jinguang Han – 12pm-12:30pm<o:p class=""></o:p></span></b></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif;" class="">
<b class=""><span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></b></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<b class=""><span style="font-size: 10pt;" class="">Bio:</span></b><span style="font-size: 10pt;" class=""><span class="Apple-converted-space"> </span>Jinguang Han is a research fellow in Surrey Centre for Cyber Security, University of Surrey, UK. He earned
his PhD degree from University of Wollongong in 2013 and obtained the Chinese Government Award for Outstanding Self-Financed Students Abroad in 2012. His research interests include cryptography, access control, cloud computing and network security. He is a
member of International Association for Cryptologic Research (IACR), Association for Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE) and Chinese Association for Cryptology Research (CACR).<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<span style="font-size: 10pt;" class="">He has published more than 40 academic papers in journals and conferences including IEEE TPDS, IEEE TC, IEEE TIFS, IEEE TSC, IJIS, ESORICS, SecureComm etc. As a principle investigator, he finished some projects granted
by National Natural Science Foundation of China (NSFC), governments and industries. He was a program committee co-chair of The 10th International Conference on Provable Security (ProvSec 2016), and served as a program committee member of over 50 international
conferences including PST'18, CANS'17, GlobeCom'16, AsiaCCS'15, TrustComm'15,16, ISPEC'14, NSS'14. He is an associate editor of Soft Computing and a guest editor of 5 journals. He served as a reviewer of over 30 journals including IEEE TPDS, IEEE TC, IEEE
TIFS, IEEE TDSC, IEEE TCC etc.<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<span style="font-size: 10pt;" class="">He worked as an associate professor and professor in Nanjing University of Finance and Economics, China, from March, 2013 to March 2017, and a teaching assistant and lecture in Hohai University, China, from May, 2006
to July, 2009.<span class="Apple-converted-space"> </span><o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<b class=""><span style="font-size: 10pt;" class="">Dr Pardeep Kumar – 12:30pm -13:00pm<o:p class=""></o:p></span></b></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<b class=""><span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></b></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<b class=""><span style="font-size: 10pt;" class="">Presentation Abstract:</span></b><span style="font-size: 10pt;" class=""><span class="Apple-converted-space"> </span>Secure ad Trustworthy Communications in Distributed IoT Networks – The Internet of Things
(ioT0 shows a new vision ie connected technologies with the hyper-connected societies. The IoT opens new opportunities for wearable devices, home appliances and software to share, communicate information via the internet. The IoT understood was an integration
of a wide range of systems and technologies (such as smart objects, computers, laptops, phones, wireless/wired network communications, sensors, clouds and so on interconnected via the internet. As a result, security and privacy requirement for such hyper-connected
things/networks becomes critical due to some classes of the IoT devices with constrained resources. The invited speech focuses on security related challenges that IoT will encounter. Further, some of published work for IoT applications ie smart environments
will be shown.<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<b class=""><span style="font-size: 10pt;" class="">Bio:</span></b><span style="font-size: 10pt;" class=""><span class="Apple-converted-space"> </span>Pardeep Kumar is working as a researcher, cybersecurity group, Department of Computer Science, University
of Oxford. Previously, he worked with the Department of Computer Science, The Arctic University of Norway (UiT), Tromso, Norway (2015-2016) and the Centre for Wireless Communications (CWC), University of Oulu, Finland (2012-2015). His current research interests
include security in sensor networks, smart environments, cyber physical systems, body area networks, Internet of Things and cloud computing. Kumar has published more than 40 research papers including international journals and conferences and granted three
patents. As co-editor, he is editing a book, ‘Authentication in Internet of Things’ will be published by Wiley publishers, April 2019 (tentatively).<o:p class=""></o:p></span></div>
<div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: Calibri, sans-serif; text-align: justify;" class="">
<span style="font-size: 10pt;" class=""><o:p class=""> </o:p></span></div>
</div>
</div>
</blockquote>
</div>
<br class="">
</div>
</body>
</html>