Seminars & Colloquia
Computer Science, Harvard University
"The Eighth Commandment "
Monday October 25, 2004 04:00 PM
Location: 107H, Park Shop NCSU Historical Campus
(Visitor parking instructions)
This talk is part of the Triangle Computer Science Distinguished Lecturer Series
We present a robust IP protection scheme based on intrinsic content identification. The system is so structured that unlike customary protection schemes, the end user's privacy with respect to the content she uses and how she uses it (even if she pirates it) is completely protected. Joint work with Dennis Shasha.
He has worked on automata theory, introducing with D. Scott the concept of non-deterministic computations, initiated abstract complexity theory, invented automata on infinite trees, demonstrated by numerous applications the efficacy of randomness in computations, and worked extensively in cryptography.
His awards include the ACM Turing Award, The IEEE Charles Babbage Award, The Harvey Prize for Science and Technology, and the Israel Prize in Computer Science, and the ACM Kanellakis Prize for theory and Practice. He was elected to five major Academies and holds five honorary degrees.
His research interests include complexity of computations, efficient algorithms, randomized algorithms, DNA to DNA Computing, parallel and distributed computation, computer security, and anti-piracy protection. He has created, with Y. Aumann and Y.Z. Ding, Hyper-Encryption, the first ever encryption scheme provably providing everlasting secrecy against a computationally unbounded adversary, now being implemented at Harvard.
Host: Jon Doyle, Computer Science Department, NCSU