Morning Tutorials 9am-12:30pm

T1 Constitutional Law in Cyberspace

Cathedral A

Mike Godwin, Policy Fellow, Center for Democracy and Technology will teach the basics of constitutional law in cyberspace, with an emphasis on free-speech and privacy issues. This tutorial is designed to inform non-lawyers and lawyers alike about the constitutional issues that underlie computer-crime and computer civil-liberties cases, as well as about the policy issues relating to intellectual property and jurisdiction on the Net. Its goal is to prepare attendees to understand the full range of constitutional and civil-liberties issues discussed at the main panels and presentations at CFP2002.

T2 What Are Biometrics, and How Do They Work?

Telegraph Hill A & B

Facial recognition technology, iris scans, and hand geometry. The biometrics industry is booming. New applications are being developed almost daily. Industry, law enforcement and policy-makers alike are touting biometrics systems as a major tool to help thwart terrorism. What are the questions that we must ask before widely deploying these systems? How do biometrics identification systems work? Which of these systems are the most reliable? The least reliable?

Proceedings

Dr. James Wayman, Director of the Technical Security Research Center, San Jose State University, San Jose, California will offer this primer on biometrics systems so that we can better understand the strengths and limitations of these systems and therefore make better choices as to when/if to deploy them.

T3 Introduction to Cryptography

Cathedral B

The fight for privacy involves both social and technological means. Cryptography is one of the main technological tools. Three main topics will be addressed: (I) the building blocks of cryptography--secrecy (symmetric and public-key encryption), integrity (cryptographic hashes), and authenticity (message authentication codes and digital signatures; (II) the uses of cryptography, including applications, such as private to email and the Internet, and private electronic cash; and (III) the limitations of cryptography--the problems cryptography "can't" solve for you. No prior knowledge of cryptography or higher mathematics will be assumed.

Dr. Ian Goldberg, Chief Scientist for Zero Knowledge Systems will lead this session, simplifying complex issues. Goldberg is internationally recognized as one of the world's leading cryptographers and cypherpunks. Ian was a founding member of Berkeley's Internet Security, Applications, Authentication and Cryptography group. In addition to developing many of the leading network software titles for the Palm Pilot, Ian is known for his part in breaking the first RSA Secret Key Challenge in three and a half hours, Netscape's implementation of the encryption system SSL, the cryptography in the GSM celllular phone standard, and the security protocols of the 802.11 wireless networking standard. In November 1998, Wired magazine selected Ian as one of the "Wired 25"--the twenty-five people who in 1998 are "about to change the rules all over again."

     
         
           
           


Privacy Policy