Kent Interdisciplinary Research Centre in Cyber Security (KirCCS), University of Kent
Research Area: cyber security, human factors, digital forensics and cybercrime, and multimedia computing.
Speech Title: When will passwords die? Research challenges and opportunities in user authentication
Passwords have been with us since ancient times, and their use on digital computers have lasted for over half a century. In the past many experts repeatedly predicted that passwords would soon die. However, all such predictions have been proven wrong and today we are still living in a world full of passwords. In this talk the speaker will share his thoughts on challenges and opportunities in this important area of cyber security research. He will discuss with the audience on why passwords haven't died and why other authentication factors and multi-factor authentication haven't managed to make passwords obsolete yet. He will go beyond textual passwords to cover more knowledge-based user authentication methods such as graphical passwords, advanced threats especially side channel attacks and malicious observers such as shoulder surfers and keyloggers, and other related security mechanisms such as password policies. He will introduce some of his past and ongoing research work in this area, and call for more research on some less investigated sub-areas in user authentication.
Jilin University, China
Research Area: Wireless Networks
Speech Title: 5G's roles in ICT system
This lecture presents some current work on intelligent and connected transportation system (ICT), particularly focuses on the state of the art of the framework and key technologies, with describing the scheme of the future intelligent and connected transportation system and its working principle. The future intelligent and connected transportation system should have the function of full path planning and precise, and the Real-time Kinematic (RTK) and Synthetic Aperture Radar (SAR) technologies are used to detect and locate moving or non-moving objects, including those without GPS. And the continuity of the detection signal can be guaranteed in the environment where GPS signals are weak or non-signaled (e.g., tunnel, indoor) and the situation of close-range and non-visual. The Mobile Edge Computing (MEC) theory can also be used in the system to solve the key problems such as low latency and large-scale network access, and the big data, cloud computing, Internet of Things (IoTs) and mobile communication technologies are used to realize the global and networked intelligent and connected transportation system. The work is expected to sustain our nation significantly to play a leading role in upcoming fundamental theories and key technologies for intelligent and connected transportation systems, and maximizing the commercialization and application of 5G communication.
Prof. Jinming Wen
Research Area: Lattice reduction, Sparse and low-rank recovery, Machine learning, Reinforcement learning and internet of things
Speech Title: Lattice reduction and lattice problems
In many applications, such as wireless communications and cryptography, we need to solve a lattice problem. In this talk, we first introduce some commonly used lattice reduction strategies and investigate their effects in detecting an integer vector from a linear model, then we introduce some efficient methods to solve some popular lattice problems.