<?xml version="1.0"?>
<News hasArchived="false" page="39" pageCount="221" pageSize="10" timestamp="Tue, 28 Apr 2026 17:24:06 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=39">
<NewsItem contentIssues="true" id="97592" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/97592">
<Title>talk: Elisa Bertino on Security and Privacy in the IoT, 1-2 Fri 11/20</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/11/ElisaBertino-1024x512.jpg" alt="" style="max-width: 100%; height: auto;">Professor Elisa Bertino of Purdue University<hr><h1><strong>Security and Privacy in the IoT</strong></h1><h2><strong>Professor Elisa Bertino</strong><br><strong>Purdue University</strong></h2><h3><strong>1:00-2:00 pm Friday, 20 November 2020</strong></h3><h4><strong><a href="https://umbc.webex.com/umbc/j.php?MTID=m142d17963d833ce0f1e7d466067c066d" rel="nofollow external" class="bo">Participate via Webex</a></strong><a href="https://umbc.webex.com/umbc/j.php?MTID=m142d17963d833ce0f1e7d466067c066d" rel="nofollow external" class="bo"></a></h4><p>Phone +1-202-860-2110; code: 120 706 1902</p><hr><p>The <a href="https://en.wikipedia.org/wiki/Internet_of_things" rel="nofollow external" class="bo">Internet of Things</a> (IoT) paradigm refers to the network of physical objects or”things” embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with servers, centralized systems, and/or other connected devices based on a variety of communication infrastructures. IoT makes it possible to sense and control objects creating opportunities for more direct integration between the physical world and computer-based systems. IoT will usher automation in a large number of application domains, ranging from manufacturing and energy management (e.g., <a href="https://en.wikipedia.org/wiki/Smart_grid" rel="nofollow external" class="bo">Smart Grid</a>), to healthcare management and urban life (e.g. Smart City). However, because of its fine-grained, continuous, and pervasive data acquisition and control capabilities, IoT raises concerns about security and privacy. Deploying existing security solutions to IoT is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. In this talk, after outlining key challenges in IoT security and privacy, we present initial approaches to securing IoT data and then focus on our recent work on security analysis for cellular network protocols and edge-based anomaly detection.</p><hr><p><a href="https://www.cs.purdue.edu/people/faculty/bertino" rel="nofollow external" class="bo"><strong>Elisa Bertino</strong></a> is a professor of Computer Science at Purdue University. Prior to joining Purdue, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory (now Almaden) in San Jose, at the Microelectronics and Computer Technology Corporation, at Rutgers University, and at Telcordia Technologies. Her main research interests include security, privacy, database systems, distributed systems, and sensor networks. Her research focuses on digital identity management, biometrics, IoT security, security of 4G and 5G cellular network protocols, and policy infrastructures for managing distributed systems. Prof. Bertino has published more than 700 papers in all major refereed journals, and in proceedings of international conferences and symposia. She has given keynotes, tutorials, and invited presentations at conferences and other events. She is a Fellow member of ACM, IEEE, and AAAS. She received the 2002 IEEE Computer Society Technical Achievement Award “For outstanding contributions to database systems and database security and advanced data management systems”, the 2005 IEEE Computer Society Tsutomu Kanai Award for “Pioneering and innovative research contributions to secure distributed systems”, and the ACM 2019-2020 Athena Lecturer Award.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/11/talk-elisa-bertino-on-security-and-privacy-in-the-iot-1-2-fri-11-20/" rel="nofollow external" class="bo">talk: Elisa Bertino on Security and Privacy in the IoT, 1-2 Fri 11/20</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professor Elisa Bertino of Purdue University  Security and Privacy in the IoT  Professor Elisa Bertino Purdue University  1:00-2:00 pm Friday, 20 November 2020  Participate via Webex  Phone...</Summary>
<Website>https://www.csee.umbc.edu/2020/11/talk-elisa-bertino-on-security-and-privacy-in-the-iot-1-2-fri-11-20/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/97592/guest@my.umbc.edu/71903ccb2e1e7237d004a8c76b64ce24/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 19 Nov 2020 18:17:15 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="97454" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/97454">
<Title>talk: Cybersecurity &amp; Local Government: Findings from a Nationwide Survey, 12-12 EST 11/19</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/11/norris-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h2><strong>Cybersecurity and Local Government: Findings from a Nationwide Survey</strong></h2><h2><strong>Donald Norris &amp; Laura Mateczun</strong></h2><h3><strong>11:00-12:00 EST, Thursday, Nov 19, 2020</strong></h3><h4><a href="https://umd.zoom.us/webinar/register/WN_V5kzYAijSWicRldpKzqXxw" rel="nofollow external" class="bo">register</a> to get the webinar link</h4><hr><p>This talk will discuss data and results from the first nationwide survey of cybersecurity among local or grassroots governments in the United States, examines how these governments manage this important function. As we have shown elsewhere, cybersecurity among local governments is increasingly important because these governments are under constant or nearly constant cyberattack. Due to the frequency of cyberattacks, as well as the probability that at least some attacks will succeed and cause damage to local government information systems, these governments have a great responsibility to protect their information assets. This, in turn, requires these governments to manage cybersecurity effectively, something our data show is largely absent at the American grassroots. That is, on average, local governments fail to manage cybersecurity well. After discussing our findings, we conclude and make recommendations for ways of improving local government cybersecurity management.</p><p><a href="https://publicpolicy.umbc.edu/donald-f-norris/" rel="nofollow external" class="bo">Donald F. Norris</a> is Professor Emeritus, School of Public Policy, University of Maryland, Baltimore County. His principal field of study is public management, specifically information technology in governmental organizations, including electronic government and cybersecurity. He has published extensively in refereed journals in these areas. He received a B.S. in history from the University of Memphis and an M.A. and a Ph. D. in political science from the University of Virginia.</p><p><a href="https://www.linkedin.com/in/laura-mateczun/" rel="nofollow external" class="bo">Laura Mateczun</a> is a graduate of the University of Maryland Francis King Carey School of Law, and a member of the Maryland Bar. She is currently a Ph.D. student at the University of Maryland, Baltimore County School of Public Policy studying public management. Her research interests involve local government cybersecurity, criminal justice, and the importance of equity in</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/11/talk-cybersecurity-local-government-findings-from-a-nationwide-survey-12-12-est-11-19/" rel="nofollow external" class="bo">talk: Cybersecurity &amp; Local Government: Findings from a Nationwide Survey, 12-12 EST 11/19</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Cybersecurity and Local Government: Findings from a Nationwide Survey  Donald Norris &amp; Laura Mateczun  11:00-12:00 EST, Thursday, Nov 19, 2020  register to get the webinar link   This talk...</Summary>
<Website>https://www.csee.umbc.edu/2020/11/talk-cybersecurity-local-government-findings-from-a-nationwide-survey-12-12-est-11-19/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/97454/guest@my.umbc.edu/868e287c8d61a98456ed69f5cef558ed/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 14 Nov 2020 19:46:36 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="97182" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/97182">
<Title>Alan Sherman and collaborators develop VoteXX with new strategies for secure online voting</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="451" src="https://www.csee.umbc.edu/wp-content/uploads/2020/11/remotegrity-1024x451.png" alt="" style="max-width: 100%; height: auto;">Remotegrity was the first voter-verifiable Internet voting system used in 2011 for a public office election in Takoma Park, Maryland<hr><h2><strong>Alan Sherman and collaborators develop VoteXX with new strategies for secure online voting</strong></h2><hr><p>Over the past several months, the topic of online voting has been at the top of the minds of millions of Americans and has been widely debated. Supporters often highlight how it would increase voter turnout through improved accessibility and convenience. Privacy and election integrity are among the top concerns about implementing an online voting system.</p><p>Researchers from UMBC and <strong>xx.network</strong> have been working to design an online voting system that is resistant to coercion and would provide a secure way for people to cast their ballots from computers, tablets, and smartphones in the future. <strong><a href="https://cybersecurity.umbc.edu/alan-sherman/" rel="nofollow external" class="bo">Alan Sherman</a></strong>, professor of computer science and electrical engineering, is developing the system, <a href="http://votexx.org" rel="nofollow external" class="bo"><strong>VoteXX</strong></a>, with <strong><a href="https://en.wikipedia.org/wiki/David_Chaum" rel="nofollow external" class="bo">David Chaum</a></strong>, a cryptographer known for his work on privacy-centered technology, and <strong>Richard Carback </strong>‘05, M.S. ‘08, Ph.D. ‘10, computer science, who has spent his career deflecting would-be hackers.</p><p>The security of devices that voters might use to cast their ballot is a significant concern, notes Sherman. He explains that malware on the devices that voters use might change the votes or spy on the voter.</p><div><img src="https://i2.wp.com/news.umbc.edu/wp-content/uploads/2020/11/Sherman-Forno-NSF-5120.jpg?resize=720%2C480&amp;ssl=1" alt="Two men facing each other talking in a hallway." style="max-width: 100%; height: auto;">Alan Sherman, right, talking with Rick Forno on campus in 2018. Photo by Marlayna Demond ’11 for UMBC.</div><p>As described in a <a href="https://votexx.org/votexx-press-release.pdf" rel="nofollow external" class="bo">press release</a> and the researchers’ <a href="https://votexx.org/votexx-whitepaper.pdf" rel="nofollow external" class="bo">new whitepaper</a>, <strong>VoteXX</strong> allows voters to confirm that their ballots were accurately cast, collected, and counted. This system uses ideas from an earlier system, <a href="https://www.csee.umbc.edu/2011/11/remotegrity-first-voter-verifiable-internet-voting-for-public-office/" rel="nofollow external" class="bo">Remotegrity</a>, that the collaborators developed and used in a municipal election in Takoma Park, Maryland, in 2011. Voters received secret vote codes on a scratch-off card via traditional mail, which they used to hide their votes from the software and hardware.  Remotegrity was based on <a href="https://en.wikipedia.org/wiki/Scantegrity" rel="nofollow external" class="bo">Scantegrity</a>, an earlier in-person verifiable voting that was also used in binding elections in Takoma Park, Maryland.</p><p><strong>VoteXX</strong> uses a combination of simple strategies and complex cryptography to create a more secure online voting scheme.  For example, to address the issues of coercion and vote selling, VoteXX allows voters to cancel or change their vote up to a certain deadline. David Chalm explains how this simple capability undermines vote selling.  “You make it possible to flip (change or cancel) that vote outside the voting process. Because a vote buyer cannot be sure you didn’t or won’t flip your vote, they can’t be sure that a voter has been honest with them, making it useless to buy votes.”</p><p>This “vote flipping” approach provides a subversively simple yet powerful tool to voters. It’s accomplished by creating a “flip code” during the registration process that allows the voter to flip their vote after casting. </p><p>You can read more about this research in a <a href="https://news.umbc.edu/umbcs-alan-sherman-and-collaborators-develop-strategy-for-secure-online-voting-in-future-u-s-elections/" rel="nofollow external" class="bo">UMBC News article</a> by <a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo">Megan Hanks</a>.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/11/alan-sherman-and-collaborators-develop-votexx-with-new-strategies-for-secure-online-voting/" rel="nofollow external" class="bo">Alan Sherman and collaborators develop VoteXX with new strategies for secure online voting</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Remotegrity was the first voter-verifiable Internet voting system used in 2011 for a public office election in Takoma Park, Maryland  Alan Sherman and collaborators develop VoteXX with new...</Summary>
<Website>https://www.csee.umbc.edu/2020/11/alan-sherman-and-collaborators-develop-votexx-with-new-strategies-for-secure-online-voting/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/97182/guest@my.umbc.edu/104eb19be8f29809ee8fd532f50710fd/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 03 Nov 2020 21:00:42 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="96901" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/96901">
<Title>talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="511" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/katz-1024x511.png" alt="" style="max-width: 100%; height: auto;"><hr><h5><strong>UMBC Cyber Defense Lab presents</strong></h5><hr><h2><strong>Secure Computation: From Theory to Practice</strong></h2><h3><strong>Jonathan Katz</strong></h3><h3><strong>Computer Science Department<br>University of Maryland, College Park</strong></h3><h3><strong>12:00–1:00 pm EDT, Friday, 30 October 2020</strong><br>Online via <a href="https:://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">Webex</a> </h3><hr><p>Protocols for secure multi-party computation (<a href="https://en.wikipedia.org/wiki/Secure_multi-party_computation" rel="nofollow external" class="bo">MPC</a>) allow a collection of mutually distrusting parties to compute a function of their private inputs without revealing anything else about their inputs to each other. Secure computation was shown to be feasible 35 years ago, but only in the past decade has its efficiency been improved to the point where it has been implemented and, more recently, begun to be used. This real-world deployment of secure computation suggests new applications and raises new questions.</p><p>This talk will survey some recent work at the intersection of the theory and practice of MPC, focusing on a surprising application to the construction of <a href="https://microsoft.github.io/Picnic/" rel="nofollow external" class="bo">Picnic</a>, a “post-quantum” signature scheme currently under consideration by NIST for standardization.</p><p><a href="https://www.cs.umd.edu/~jkatz/" rel="nofollow external" class="bo">Jonathan Katz</a> is a faculty member in the department of computer science at the University of Maryland, College Park, where he formerly served as director of the Maryland Cybersecurity Center for over five years. He is an IACR Fellow, was named a University of Maryland distinguished scholar-teacher in 2017-2018, and received the ACM SIGSAC Outstanding Contribution Award in 2019.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public.</p><p>Upcoming CDL Meetings: Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]; Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/" rel="nofollow external" class="bo">talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab presents   Secure Computation: From Theory to Practice  Jonathan Katz  Computer Science Department University of Maryland, College Park  12:00–1:00 pm EDT, Friday, 30...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/96901/guest@my.umbc.edu/a580ce37e185c50617d9276b6afde94e/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>quantum-computing</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 24 Oct 2020 13:33:48 -0400</PostedAt>
<EditAt>Sat, 10 Oct 2020 13:33:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="96804" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/96804">
<Title>NFS CyberCorps Scholarship for Service(SFS)</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/Slider-Info-2020-1-1024x561.jpg" alt="" width="804" height="440" style="max-width: 100%; height: auto;"><hr><hr><h3>Earn full tuition, fees, and stipends $25,000 – $34,000 annual scholarships for up to 3 years</h3><h4>(government employment required for every year of scholarship)</h4><h3>For BS (rising juniors or seniors), MS, MPS, or PhD in CS, CE, IS, Cyber or related fields</h3><h3>USA citizenship or permanent residency required</h3><h3>MINIMUM GPA of 3.25</h3><hr><h3>Contact: Dr. Alan Sherman *protected email*</h3><h3><em>For more information: </em><a href="http://www.sfs.opm.gov" rel="nofollow external" class="bo"><em>www.sfs.opm.gov</em></a><em>                                                                                              or                                                                                               <a href="https://cybersecurity.umbc.edu/scholarship-for-service-sfs/">https://cybersecurity.umbc.edu/scholarship-for-service-sfs/</a></em></h3><h3><strong><em>APPLY THROUGH SCHOLARSHIP RETRIEVER:</em></strong><em><a href="https://scholarships.umbc.edu/retriever/">https://scholarships.umbc.edu/retriever/</a></em></h3></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/nfs-cybercorps-scholarship-for-servicesfs/" rel="nofollow external" class="bo">NFS CyberCorps Scholarship for Service(SFS)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Earn full tuition, fees, and stipends $25,000 – $34,000 annual scholarships for up to 3 years  (government employment required for every year of scholarship)  For BS (rising juniors or seniors),...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/nfs-cybercorps-scholarship-for-servicesfs/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/96804/guest@my.umbc.edu/0390f3d17c6f6a7ba91adf514ac79ead/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 20 Oct 2020 21:30:12 -0400</PostedAt>
<EditAt>Tue, 20 Oct 2020 21:30:12 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="96764" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/96764">
<Title>ASHP CIO &amp; Director of Technology Security Presentation</Title>
<Tagline>Check out the presentation if you missed out!</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Here are the presentation slides from the CIO of ASHP, Bob Rosecrans, and Director of Technology Infrastructure and Desktop Services, Moe Alsubu. <div><br></div><div>The presentation covers IS career opportunity, the evolution of cyber security within organizations, and steps to improve an organization's security posture.</div><div><br></div><div>Check it out in the attached slides!</div><div><br></div><div>~Your ISSA Board</div></div>
]]>
</Body>
<Summary>Here are the presentation slides from the CIO of ASHP, Bob Rosecrans, and Director of Technology Infrastructure and Desktop Services, Moe Alsubu.     The presentation covers IS career opportunity,...</Summary>
<AttachmentKind>Presentation</AttachmentKind>
<AttachmentUrl>https://assets1-my.umbc.edu/system/shared/attachments/73b8e59c6b3e7319f58e2570569bde53/69f12576/news/000/096/764/263f71c11bcabae5f862a1d8c05a8738/Small But Effective Steps (2).pptx?1603155101</AttachmentUrl>
<Attachments>
<Attachment kind="Presentation" url="https://my3.my.umbc.edu/groups/ieee/posts/96764/attachments/37619"></Attachment>
</Attachments>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/96764/guest@my.umbc.edu/c356d47848e0e4bc35ba5b7ae40a4780/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 19 Oct 2020 20:51:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="96761" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/96761">
<Title>UMBC&#8217;s Jack Suess to receive 2020 EDUCAUSE Leadership Award</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/Jack_Suess_tweet-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"><em>Jack Suess. Photo by Marlayna Demond ’11 for UMBC.</em><hr><h2><strong>UMBC’s Jack Suess to receive 2020 EDUCAUSE Leadership Award</strong></h2><hr><p>UMBC Vice President for Information Technology <strong>Jack Suess</strong> will soon receive one of the highest national recognitions offered to professionals in his field: the <a href="https://www.educause.edu/careers/awards-program" rel="nofollow external" class="bo">EDUCAUSE Leadership Award</a>. </p><p>EDUCAUSE is a nonprofit association that focuses on information technology (IT) in higher education and includes more than 2,300 member colleges, universities, and groups. Suess ‘81, mathematics, M.S. ‘94, information systems, will receive the award during the EDUCAUSE Annual Conference, which will be held virtually this month. </p><p>“This is a tremendous honor for me. Given that my entire career has been at UMBC, it also is testament to the innovative and collaborative culture of the UMBC community,” Suess says. “In particular, I want to highlight the technology leadership of my Division of Information Technology colleagues. Through all of their efforts, UMBC is looked at as a model for the use of technology in higher education.”</p><p>Read more information on this <a href="https://news.umbc.edu/umbcs-jack-suess-to-receive-2020-educause-leadership-award/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/umbcs-jack-suess-to-receive-2020-educause-leadership-award/" rel="nofollow external" class="bo">UMBC’s Jack Suess to receive 2020 EDUCAUSE Leadership Award</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Jack Suess. Photo by Marlayna Demond ’11 for UMBC.  UMBC’s Jack Suess to receive 2020 EDUCAUSE Leadership Award   UMBC Vice President for Information Technology Jack Suess will soon receive one of...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/umbcs-jack-suess-to-receive-2020-educause-leadership-award/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/96761/guest@my.umbc.edu/de92b9051c38076c0855b9455df4d2ad/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 19 Oct 2020 17:32:57 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="96631" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/96631">
<Title>CSEE URM WORKSHOP &amp; SOCIAL EVENT</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/Slide-2-1024x375.jpg" alt="" width="923" height="336" style="max-width: 100%; height: auto;"><p><strong>Where</strong>: <a href="https://umbc.webex.com/mw3300/mywebex/default.do?nomenu=true&amp;siteurl=umbc&amp;service=6&amp;rnd=0.9842035419263436&amp;main_url=https%3A%2F%2Fumbc.webex.com%2Fec3300%2Feventcenter%2Fevent%2FeventAction.do%3FtheAction%3Ddetail%26%26%26EMK%3D4832534b00000004cffc5ef3cd97bb36857eb8bfc701fca9c84c9de7139aa0fb6e8d7f7a360050c2%26siteurl%3Dumbc%26confViewID%3D174474038214689768%26encryptTicket%3DSDJTSwAAAASNlo7KwNCJnHpvnpTBDYoGckiMFQwpN-8UTU4JaOYYYw2%26" rel="nofollow external" class="bo">https://umbc.webex.com/</a></p><p>This is the second in a series of events that aim to build community among students from groups traditionally underrepresented in the field of computing.</p><p>Join us for an opportunity to meet, chat with, and engage fellow CSEE students, faculty, staff, and alumni.</p><p>Panelists will discuss life beyond the undergraduate years.</p><p><strong>Let’s Do This! Be Social- Virtually</strong></p><p>Welcome Remarks– Dr. Freeman Hrabowski</p><h3>Alumni Speakers</h3><p>Dr. Jeff Avery, Northrup Grumman</p><p>Federico Cifuentes-Urtubey, Ph.D. student, UIUC </p><p>Dr. Patti Ordóñez, Associate Prof., UP-RP</p><p>Dr. Nwokedi Idika, Google</p><p>Kerry Luke, Northrop Grumman</p><h3>CSEE Faculty Speakers</h3><p>Mr. Ivan Sekyonda                                Dr. Marcella Wilson </p><p> Dr. Dmitri Perkins                               Dr. David Chapman</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/csee-urm-workshop-social-event/" rel="nofollow external" class="bo">CSEE URM WORKSHOP &amp; SOCIAL EVENT</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Where: https://umbc.webex.com/  This is the second in a series of events that aim to build community among students from groups traditionally underrepresented in the field of computing.  Join us...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/csee-urm-workshop-social-event/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/96631/guest@my.umbc.edu/238be281459448b2716e80f0e0859a79/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 14 Oct 2020 12:40:50 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="96547" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/96547">
<Title>talk: BVOT, Self-Tallying Boardroom Voting with Oblivious Transfer; 12-1pm 11/6</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/voting-1024x512.png" alt="" style="max-width: 100%; height: auto;"> BVOT is a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally info. available before polls close), and dispute-freeness (voters can see that all voters followed the protocol).<hr><h4><strong>UMBC Cyber Defense Lab</strong></h4><h2><strong>BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer</strong></h2><h3><strong>Farid Javani, CSEE, UMBC</strong></h3><h4>12:00–1:00pm, Friday, 6 November 2020</h4><h4><a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">http://<strong>umbc.webex.com/meet/sherman</strong></a></h4><p><strong>(Joint work with Alan T. Sherman)</strong></p><hr><p>A boardroom election is an election with a small number of voters carried out with public communications. We present <a href="https://arxiv.org/pdf/2010.02421.pdf" rel="nofollow external" class="bo">BVOT</a>, a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally information is available before the polls close), and dispute-freeness (voters can observe that all voters correctly followed the protocol).</p><p><a href="https://arxiv.org/pdf/2010.02421.pdf" rel="nofollow external" class="bo">BVOT</a> works by using a multiparty threshold homomorphic encryption system in which each candidate is associated with a masked unique prime. Each voter engages in an oblivious transfer with an untrusted distributor: the voter selects the index of a prime associated with a candidate and receives the selected prime in a masked form. The voter then casts their vote by encrypting their masked prime and broadcasting it to everyone. The distributor does not learn the voter’s choice, and no one learns the mapping between primes and candidates until the audit phase. By hiding the mapping between primes and candidates, BVOT provides voters with insufficient information to carry out effective cheating. The threshold feature prevents anyone from computing any partial tally—until everyone has voted. Multiplying all votes, their decryption shares, and the unmasking factor yields a product of the primes each raised to the number of votes received.</p><p>In contrast to some existing boardroom voting protocols, BVOT does not rely on any zero-knowledge proof; instead, it uses oblivious transfer to assure ballot secrecy and correct vote casting. Also, BVOT can handle multiple candidates in one election. BVOT prevents cheating by hiding crucial information: an attempt to increase the tally of one candidate might increase the tally of another candidate. After all votes are cast, any party can tally the votes.</p><p><a href="https://www.linkedin.com/in/farid-javani-68118741/" rel="nofollow external" class="bo">Farid Javani</a> is a Ph.D. candidate in computer science at UMBC, working with Alan Sherman. His research interests include algorithms, security, applied cryptography, and distributed systems. He is the manager of the Enterprise Architecture team at CCC Information Services in Chicago. email: *protected email*</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1:00 pm. All meetings are open to the public. Upcoming CDL Meetings: Oct. 30, Jonathan Katz (UMCP), [possibly on secure distributed computation]; Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]; and Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-bvot-self-tallying-boardroom-voting-with-oblivious-transfer-12-1pm-11-6/" rel="nofollow external" class="bo">talk: BVOT, Self-Tallying Boardroom Voting with Oblivious Transfer; 12-1pm 11/6</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary> BVOT is a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally info. available before polls close), and dispute-freeness (voters can see that all voters followed the...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-bvot-self-tallying-boardroom-voting-with-oblivious-transfer-12-1pm-11-6/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/96547/guest@my.umbc.edu/da99e45758afdd4daaaed61ccab40a10/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 11 Oct 2020 17:46:41 -0400</PostedAt>
<EditAt>Mon, 19 Oct 2020 17:46:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="96414" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/96414">
<Title>talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/dc_blockchain_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h3>UMBC Data Science Meetup Talk</h3><h1><strong>Exploding Blockchain Myths</strong></h1><h3><strong>Maria Vachino and Dr. James P. Howard</strong></h3><h3>5:30-7:00pm Tuesday, 13 October 2020</h3><hr><p>In this talk, Maria Vachino from Easy Dynamics and Dr. James P. Howard from APL will provide an overview of what blockchain is and isn’t, focusing on non-cryptocurrency use cases, will explain the results of their research for the DHS S&amp;T Cybersecurity Directorate, and will provide insight into the value (or lack therefore) of the technology. </p><p>References:<br>  • <a href="https://ieeexplore.ieee.org/document/8965252/" rel="nofollow external" class="bo">https://ieeexplore.ieee.org/document/8965252/</a><br>  • <a href="http://jitm.ubalt.edu/XXX-3/article3.pdf" rel="nofollow external" class="bo">http://jitm.ubalt.edu/XXX-3/article3.pdf</a></p><p><a href="https://www.linkedin.com/in/mariavachino/" rel="nofollow external" class="bo">Maria Vachino</a> is the Director of Digital Identity at <a href="https://www.easydynamics.com/" rel="nofollow external" class="bo">Easy Dynamics</a> where she is focused on Identity Credential &amp; Access Management (ICAM) technologies, policies, &amp; standards, Cybersecurity, and IT modernization for the US Federal Government. She started investigating applications for blockchain technology in 2015 as the Technical and Government Engagement Lead for the DHS S&amp;T Cyber Security Directorate’s Identity Management Research &amp; Development Program while a member of the Senior Professional Staff at the Johns Hopkins Applied Physics Lab. Maria has a BS in Computer Science from UMBC and an MS in Cybersecurity.</p><p>Dr. <a href="https://www.linkedin.com/in/k3jph/" rel="nofollow external" class="bo">James P. Howard, II</a> (UMBC Ph.D. ’14) is a scientist at the <a href="https://www.jhuapl.edu/" rel="nofollow external" class="bo">Johns Hopkins Applied Physics Laboratory</a>. Previously, he was a consultant to numerous government agencies, including the Securities and Exchange Commission, the Executive Office of the President, and the United States Department of Homeland Security, and worked for the Board of Governors of the Federal Reserve System as an internal consultant on scientific computing. He is a passionate educator, teaching mathematics and statistics at the University of Maryland Global Campus since 2010 and has taught public management at Central Michigan University, Penn State, and the University of Baltimore. His most recent work has modeled the spread of infectious respiratory diseases and Ebolavirus, predicted global disruptive events, researched using blockchain for government services, and created devices for rescuing victims of building collapse. He is the author of two books.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/" rel="nofollow external" class="bo">talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Data Science Meetup Talk  Exploding Blockchain Myths  Maria Vachino and Dr. James P. Howard  5:30-7:00pm Tuesday, 13 October 2020   In this talk, Maria Vachino from Easy Dynamics and Dr....</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/96414/guest@my.umbc.edu/4ce014e368b2808f1d0adb01e8da032e/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 06 Oct 2020 20:58:09 -0400</PostedAt>
<EditAt>Tue, 06 Oct 2020 20:58:09 -0400</EditAt>
</NewsItem>

</News>
