Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Past Programs  

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 nilsen youtube

Keynote: SITH3, Technology-Enabled Remote Monitoring and Support
Wendy Nilsen
National Institutes of Health (NIH)
May 17, 2013

sith3 panel1 youtube

Intersection of mHealth and Behavioral Health
SITH3 Workshop, Panel 1
May 17, 2013

 

Newsletter 

ists newsletter summer 2012

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

Algorithms for High-Assurance in Cyber-Security

Project Summary

Authenticating data and results of computations in untrusted or adversarial environments is a fundamental task in cyber-security. This problem captures the security needs of many computing applications that exchange and use sensitive information in hostile and distributed computing settings, and its importance increases given the current trend in modern system design towards decentralized architectures with minimal trust assumptions.

This project is aiming to develop authentication techniques that enhance information assurance in various computing settings. Following an algorithmic approach, the goal is to develop secure, cost-efficient and scalable solutions that ensure authenticity of information in untrusted or pervasive environments as well as trustworthy computations in highly distributed or heterogeneous networked systems. Specific research topics include: a) advanced data authentication, exploring verification of information received by untrusted parties and focusing on expressiveness, efficiency, privacy and consistency, and b) secure distributed searching and computing, exploring information assurance and trustworthiness of computations in highly decentralized settings. Target applications of interest include: secure data processing in sensor networks, secure data management in outsourced file systems or peer-to-peer systems and secure data sharing in collaboration systems.

  • Principal Investigator: Nikos Triandopoulos

Last Updated: 9/17/08