Don't miss an insight. Subscribe to Corrosionpedia for free.


Applied Cryptography for Securing Cyber-Infrastructure

Starts: December 11, 2015 | Time: 1:00 PM EST
Ends: December 11, 2015 | Time: 5:00 PM EST
Location: American Society of Naval Engineers, 1452 Duke Street, Alexandria, VA 22314

Dr. Bharat B. Madan is a Professor in the Modeling, Simulation and Visualization Engineering Department, Old Dominion University since 2012, where he teaches and conducts research in networked system security, attack tolerant systems and network data analytics. Prior to joining ODU, he was the Head of the Distributed Systems Department at the Applied Research Laboratory of The Pennsylvania State University. Over the last ten years, he has been working on a number of sponsored research projects dealing with sensor networks, sensor data fusion, machine learning, modeling and analysis of weapons of mass destruction (WMD) effects on networks, intrusion tolerance, security quantification, wireless network capacity and semantics driven service oriented network of sensors & platforms. He was the PI for a number of sponsored research projects. These include, AFOSR funded project “Dynamic Data Driven Machine Perception and Learning for Border Control” and two DTRA funded projects that deal with modeling and analysis of cascading failures in infrastructure systems subjected to WMD events and the design of networking structures that can are inherently capable of surviving large scale failures caused by a WMD. He has more than 25 years of experience in academia at Applied Research Lab, (2004-2012) IIT Delhi (1976-1996), Naval Postgraduate School (1984-1985), University of Delaware (1988-1989), Old Dominion University (1989-1995), Duke University (2001-2004) and ARL Penn State University (2004-present). He has also worked in the industry R&D for over five years, first at IBM (1996-1999) designing and implementing networking protocol stacks (for the OS2 and the main frame OS/390 operating systems) IPSec & Secure FTP and after that at Ericsson, where he was involved in R&D activities related to wireless voice and data networking, hand-held multi-media communication devices and mobile IP. He has published over 70 papers in peer reviewed journals and international conference proceedings and also has a patent.

Course Description: Need for cryptography for protecting information confidentiality and integrity; Cryptographic constructs (Hash function, Message integrity codes, Digital signatures, One time signatures, Digital certificates, Encryption); Public and Private key cryptography; Private (DES, AES standard) and public key encryption standards (RSA, Elliptic Curve Cryptography (ECC).

Course Level: Intermediate (200 Level) - learner require basic knowledge and understanding of the topic area.

Go back to top