pages.cpsc.ucalgary.ca
Unfettered by Content: John's Home Page
http://pages.cpsc.ucalgary.ca/~aycock
Department of Computer Science. ICT 650, (403) 210-9409. An art project: computer-generated parody of Mitt Romney's political tweets. The @TransforMitt Twitter feed. A tweet-to-tweet comparison of @MittRomney vs. @TransforMitt. A technical report with the gory, geeky details. The final academic paper. Conceptual art. Because I like the concept of staying out of jail. J Aycock. Painting the Internet. 2 (April 2008), pp. 112-113, MIT Press. Department of Computer Science, University of Calgary, 2006. And a...
icis.cpsc.ucalgary.ca
Current Opportunties | iCORE Information Security Lab
http://icis.cpsc.ucalgary.ca/current_opportunities
My U of C. Submitted by admin on Thu, 03/06/2008 - 14:32. Thanks to an anonymous donor, a generous bursary fund has been established at the University of Calgary in SPIE’s name. Beginning this September, an award of $2,200 will be made to a third or fourth year student in Computer Science, Faculty of Science, with a concentration in Information Security. The bursary will be made available each September up to and including 2019. The application deadline is August 1st. A to Z Index.
icis.cpsc.ucalgary.ca
Nearly Optimal Deterministic Algorithm for Sparse Walsh-Hadamard Transform | iCORE Information Security Lab
http://icis.cpsc.ucalgary.ca/node/878
My U of C. Nearly Optimal Deterministic Algorithm for Sparse Walsh-Hadamard Transform. Submitted by admin on Wed, 07/22/2015 - 12:38. Nearly Optimal Deterministic Algorithm for Sparse Walsh-Hadamard Transform. Based on joint work with Piotr Indyk; arXiv manuscript 1504.07648]. A to Z Index.
icis.cpsc.ucalgary.ca
Non-Malleable Codes: Applications and Constructions. | iCORE Information Security Lab
http://icis.cpsc.ucalgary.ca/node/877
My U of C. Non-Malleable Codes: Applications and Constructions. Submitted by admin on Wed, 07/22/2015 - 12:35. Non-Malleable Codes: Applications and Constructions. In this talk, I discuss the background on non-malleable cryptography and introduce the notion of non-malleable codes. The talks follows by a discussion of the following:. 1 How non-malleable codes can be applied to provide security against tampering of the storage;. 5 Remaining open problems in the area. A to Z Index.
icis.cpsc.ucalgary.ca
Key Predistribution in Networks with Specified Communication Graphs | iCORE Information Security Lab
http://icis.cpsc.ucalgary.ca/node/875
My U of C. Key Predistribution in Networks with Specified Communication Graphs. Submitted by admin on Thu, 04/23/2015 - 14:44. Key Predistribution in Networks with Specified Communication Graphs. A to Z Index.
icis.cpsc.ucalgary.ca
Seminars | iCORE Information Security Lab
http://icis.cpsc.ucalgary.ca/seminars
My U of C. Welcome to the Seminars Pages. Submitted by admin on Thu, 03/11/2010 - 14:10. ICIS Group Talk - In-region Location Verification using Distance Bounding. Friday, September 2, 2016 - 13:00. Access Management and Graph Databases. Friday, September 16, 2016 - 13:00. August 19, 2016. Outsourcing Scheme of ABE Encryption and its Implementation and Evaluation. August 12, 2016. Privacy in Geo-social Networking Systems. August 10, 2016. June 24, 2016. To see a listing of all past seminars/conferences.
icis.cpsc.ucalgary.ca
Past iCIS Seminar Events | iCORE Information Security Lab
http://icis.cpsc.ucalgary.ca/seminars/past_seminars
My U of C. Welcome to the Seminars Pages. Past iCIS Seminar Events. Submitted by admin on Mon, 08/15/2016 - 11:55. Submitted by admin on Thu, 08/04/2016 - 09:35. Outsourcing Scheme of ABE Encryption and its Implementation and Evaluation. Submitted by admin on Thu, 08/04/2016 - 09:32. Privacy in Geo-social Networking Systems. Submitted by admin on Wed, 06/22/2016 - 11:54. Submitted by admin on Wed, 11/18/2015 - 14:01. Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary. A to Z Index.
icis.cpsc.ucalgary.ca
People - All | iCORE Information Security Lab
http://icis.cpsc.ucalgary.ca/people
My U of C. Welcome to the People Pages. Submitted by admin on Thu, 04/26/2007 - 13:06. Philip W. L. Fong. Dr Go Ohtake, Research Engineer, NHK Science and Technology Research Laboratories (Japan Broadcasting Corporation) - Dec 1, 2014 to Nov 30, 2015. A to Z Index.
ahmadi-web.info
Work Experiences - Ahmad Ahmadi (احمد احمدی)
http://www.ahmadi-web.info/work-experiences
Ahmad Ahmadi (احمد احمدی). ISPIA Group at University of Calgary. Research, Deployment and Support of Cloud Infrastructure; IBM, VCL and Openstack. System Administration and Support 2010-2013. Atech Application Technology Company. Maintenance and Troubleshooting of Systems. Developer of Network Security Solutions 2006-2010. Sharif SecureWare (Amnafzar) Company. Application Filtering, Web Filtering, Mail Gateway, Content Filtering, Log Analysis. Web Designer and Network Administration 2009-2010.
SOCIAL ENGAGEMENT