<node id="587968">
  <nid>587968</nid>
  <type>event</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1488203411</created>
  <changed>1492117958</changed>
  <title><![CDATA[Cybersecurity Lecture Series - Tianxin Tang]]></title>
  <body><![CDATA[<h3><strong>Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies. </strong></h3>

<p>The <strong>Cybersecurity Lecture Series</strong> is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.</p>

<p>Held <strong>weekly each Friday at Noon</strong> <strong>through Apr. 21,</strong> lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.</p>

<p><em>Complimentary lunch provided for registered guests. Please bring your own beverage.</em></p>

<p><a href="http://www.iisp.gatech.edu/cyber-lecture" target="_blank"><em>Sign up to receive future lecture announcements.</em></a></p>

<h3>&nbsp;</h3>

<h3><strong>Featuring Tianxin Tang on Mar. 3, 2017</strong></h3>

<h4><strong><em>&quot;</em></strong><em><strong>Keyless Fuzzy Search for Data-based Access Control</strong></em><strong><em>&quot; </em></strong></h4>

<p><strong><em>ABSTRACT</em></strong>&nbsp;&nbsp; |&nbsp;&nbsp; Key management is always problematic in terms of privacy for remotely stored data in a de-centralized environment. To alleviate this issue, we propose a concept called &quot;keyless fuzzy search,&quot; where users can query an encrypted database, retrieve its parts and decrypt only some information &quot;close to&quot; the encrypted data. While strong security in such a keyless setting is impossible to achieve, our approach prohibits remote encrypted data from easily being massively harvested or mined, because guessing the right queries can be costly for attackers if the data has some entropy.</p>

<p>&nbsp;</p>

<p><strong><em>BIO</em></strong>&nbsp;&nbsp; |&nbsp;&nbsp; <strong>Tianxin</strong><strong> Tang </strong>is a second-year Ph.D. student in the School of Computer Science. Her research interest lies in cryptography, more specifically in provable security. Her current projects are related to searchable encryption.</p>

<p>&nbsp;</p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Ph.D. Student Tianxin Tang presents a method for limiting de-encryption of protected databases.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-03-03T12:00:00-05:00]]></value>
      <value2><![CDATA[2017-03-03T13:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="538461">
            <nid>538461</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>89506</fid>
                  <filename><![CDATA[cls_email_header.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/cls_email_header.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cls_email_header.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Cybersecurity Lecture Series]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p>Lindsey Panetta, <a href="mailto:lindsey.panetta@gtri.gatech.edu">lindsey.panetta@gtri.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>322011</item>
          <item>430601</item>
          <item>50877</item>
          <item>50875</item>
          <item>50876</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[College of Computing Events]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
