Cybernetica - PowerPoint PPT Presentation

About This Presentation
Title:

Cybernetica

Description:

Peeter Laud (1977) (PhD, 2002 'Computationally secure information flow' ... Most important paper: A.Buldas, P.Laud, H.Lipmaa, J.Willemson. ... – PowerPoint PPT presentation

Number of Views:14
Avg rating:3.0/5.0
Slides: 8
Provided by: ahtob
Category:
Tags: cybernetica | laud

less

Transcript and Presenter's Notes

Title: Cybernetica


1
Cybernetica
  • Ahto Buldas
  • Chief researcher

2
Cybernetica
  • A State hold RD company in Estonia
  • Stock Capital EUR 1.15M
  • Founded 1997 as a derivative of the Institute of
    Cybernetics
  • Fields of actions data security, systems
    development, marine navigation technology.
  • 23 persons in Information Security (ISec)
    department (5 PhDs and 7 MScs)

3
ISec department activities
  • Security software development
  • Communications security
  • PKI
  • Time stamping
  • Numerous scientific papers on time-stamping
  • Close cooperation with universities

4
ISec department some people
  • Peeter Laud (1977) (PhD, 2002 Computationally
    secure information flow)
  • Meelis Roos (1975) (MSc, 1999 Integrated
    time-stamping and notarization)
  • Jan Willemson (1974 ) (PhD, 2002
    Size-efficient interval time stamps)

5
Cyberneticas RD support for national projects
  • National ID card project
  • Electronic documents and digital signatures
  • Backbone for governmental information system
    (X-road) -- Provides unified access to all
    governmental databases Ensures confidentiality,
    integrity and traceability of exchanged data

6
Time stamping and electronic notarization
  • Research on time-stamping started at 1997
  • Most important paper A.Buldas, P.Laud, H.Lipmaa,
    J.Willemson. Time-stamping with binary linking
    schemes -- CRYPTO98.
  • More than 10 papers on time-stamping and PKI, 2
    PhD theses
  • Developed -- a linkage-based time-stamping
    system, which provides
  • continuous validity of time stamps and electronic
    signatures
  • efficient off-line verification (previous schemes
    were too inefficient for practical use)
  • accountable service

7
Main goals (in this project)
  • Technical roadmap for next three years on
    information security technologies -- September,
    2003
  • International data security workshop in Estonia,
    during 2004.
Write a Comment
User Comments (0)
About PowerShow.com