Tutorial Program Monday , August 31, PM Session | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Registration Program Committee Program at-a-Glance Tutorials at-a-Glance Tutorial Instructors Technical Sessions Tuesday, Sept. 1 Wednesday, Sept. 2 Thursday, Sept. 3 Activities and Services Hotel & Travel Info USENIX & SAGE Thank Supporting Members Student Discounts and Stipends |
![]() |
M5pm
Cryptography for the Internet
half day program Bruce Schneier, Counterpane Systems Who should attend: Those who need to understand how cryptography is used over the Internet to secure communications, establish authenticity, and provide for integrity. This tutorial does not assume a strong background in mathematics. Security is essential for business and social interactions. The pre-computer world has developed many mechanisms to establish security: voice recognition on the telephone provides authentication, signatures on paper provide proof of intent, closed doors and walks in the park provide privacy, unforgeable currency provides fairness. As more businesses and social interactions move onto the Internet, the challenge is to mirror these techniques as much as possible in this new world. This tutorial will illustrate how cryptography can transform the Internet into a serious business tool by allowing for confidentiality, authentication, integrity, fairness, and much more. This tutorial will discuss the protocols to secure electronic mail, World Wide Web interactions, electronic commerce transactions, and other security measures the Internet community has developed. After completing this tutorial, participants will understand how cryptography is used on the Internet. Attendees will be able to vigorously debate the pros and cons of different systems for their own purposes. Topics covered include:
![]()
|
| ||
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() |