A top priority for the Science Academy is encouraging the youth to engage in good science, and rewarding the best examples. In order to choose and reward the best young academics and to support them in conducting new studies, an award program was initiated in the year 2013 and its fourth edition was held this year. Science Academy runs this program not with government funding, but with the support of the society at large.
Go to newsThe Academy of Medical Sciences, the British Academy and the Royal Society have today (19 June) announced the first round of recipients of their new research funding scheme, the Newton Advanced Fellowships. The scheme provides established international researchers with an opportunity to develop the research strengths and capabilities of their research groups through training, collaboration and reciprocal visits with a partner in the UK.
Go to newsWe all benefit from the endless alternatives that cloud provides us regarding our storage, computation, and distribution needs. For example, Dropbox or Wuala store our data in the cloud, so that we can reach it anywhere, anytime. Amazon EC2 and SETI@Home projects let us outsource a computational job that is beyond our computer's capabilities to the cloud. This way, more powerful machines or multiple other computers help us solve the problem. Rapidshare and BitTorrent are pervasive examples that help us distribute the files that we want to share with friends or with the world, easily, without overloading our own resources. Unfortunately, all these benefits are not without any risk!
Go to newsThe 2008 Winner is: Arvind Narayanan and Vitaly Shmatikov. Robust De-anonymization of Large Sparse Datasets. Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008).
Go to newsAt last year’s Privacy Enhancing Technologies Symposium (PETS), I presented the paper “Sampled Traffic Analysis by Internet-Exchange-Level Adversaries”, co-authored with Piotr Zieliński. In it, we discussed the risk of traffic-analysis at Internet exchanges (IXes). We then showed that given even a small fraction of the data passing through an IX it was still possible to track a substantial proportion of anonymous communications. Our results are summarized in a previous blog post and full details are in the paper.
Go to news"Fellow finalists from the Department of Computer Science at Brown University in the US were recognised for a different privacy aspect — maintaining anonymity while ensuring accountability. Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya and Erich Rachlin focused on peer-to-peer (P2P) systems, such as the popular BitTorrent file-sharing service. These types of services rely on every user's computer providing service as well as receiving services from others. The decentralised nature of peer-to-peer systems makes it difficult to ensure that all computers are providing their fair share of service.
Go to newsTürkiye’de kriptoloji ve uygulamaları alanlarında çalışan akademisyen ve lisansüstü öğrencilerinin çalışmalarının paylaşılması ve bu alanlarda ortak çalışma imkanlarının araştırılması amacıyla Zirve Üniversitesi ev sahipliğinde Kriptoloji Zirvesi düzenlenecektir.
Go to news