Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

Sal Stolfo

Salvatore J. Stolfo Columbia University
A Brief History of Symbiote DefenseTuesday, October 31st
Rockefeller 003
5:00 PM

 Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
Sudikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 


Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan




Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George


Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA

Algorithms for High-Assurance in Cyber-Security

Project Summary

Authenticating data and results of computations in untrusted or adversarial environments is a fundamental task in cyber-security. This problem captures the security needs of many computing applications that exchange and use sensitive information in hostile and distributed computing settings, and its importance increases given the current trend in modern system design towards decentralized architectures with minimal trust assumptions.

This project is aiming to develop authentication techniques that enhance information assurance in various computing settings. Following an algorithmic approach, the goal is to develop secure, cost-efficient and scalable solutions that ensure authenticity of information in untrusted or pervasive environments as well as trustworthy computations in highly distributed or heterogeneous networked systems. Specific research topics include: a) advanced data authentication, exploring verification of information received by untrusted parties and focusing on expressiveness, efficiency, privacy and consistency, and b) secure distributed searching and computing, exploring information assurance and trustworthiness of computations in highly decentralized settings. Target applications of interest include: secure data processing in sensor networks, secure data management in outsourced file systems or peer-to-peer systems and secure data sharing in collaboration systems.

  • Principal Investigator: Nikos Triandopoulos

Last Updated: 9/17/08