Morning Tutorials 9am-12:30pm
T1 Constitutional Law in Cyberspace
Cathedral A
Mike Godwin, Policy Fellow, Center for Democracy and Technology will
teach the basics of constitutional law in cyberspace, with an
emphasis on free-speech and privacy issues. This tutorial is
designed to inform non-lawyers and lawyers alike about the
constitutional issues that underlie computer-crime and computer
civil-liberties cases, as well as about the policy issues relating
to intellectual property and jurisdiction on the Net. Its goal is
to prepare attendees to understand the full range of constitutional
and civil-liberties issues discussed at the main panels and
presentations at CFP2002.
T2 What Are Biometrics, and How Do They Work?
Telegraph Hill A & B
Facial recognition technology, iris scans, and hand geometry. The
biometrics industry is booming. New applications are being developed
almost daily. Industry, law enforcement and policy-makers alike are
touting biometrics systems as a major tool to help thwart
terrorism. What are the questions that we must ask before widely
deploying these systems? How do biometrics identification systems
work? Which of these systems are the most reliable? The least
reliable?
Proceedings
Dr. James Wayman, Director of the Technical Security Research Center, San
Jose State University, San Jose, California will offer this primer
on biometrics systems so that we can better understand the strengths
and limitations of these systems and therefore make better choices
as to when/if to deploy them.
T3 Introduction to Cryptography
Cathedral B
The fight for privacy involves both social and technological means.
Cryptography is one of the main technological tools. Three main
topics will be addressed: (I) the building blocks of
cryptography--secrecy (symmetric and public-key encryption),
integrity (cryptographic hashes), and authenticity (message
authentication codes and digital signatures; (II) the uses of
cryptography, including applications, such as private to email and
the Internet, and private electronic cash; and (III) the limitations
of cryptography--the problems cryptography "can't" solve for you.
No prior knowledge of cryptography or higher mathematics will be
assumed.
Dr. Ian Goldberg, Chief Scientist for Zero Knowledge Systems will
lead this session, simplifying complex issues. Goldberg
is internationally recognized as one of the world's
leading cryptographers and cypherpunks. Ian was a founding member
of Berkeley's Internet Security, Applications, Authentication and
Cryptography group. In addition to developing many of the leading
network software titles for the Palm Pilot, Ian is known for his
part in breaking the first RSA Secret Key Challenge in three and a
half hours, Netscape's implementation of the encryption system SSL,
the cryptography in the GSM celllular phone standard, and the
security protocols of the 802.11 wireless networking standard. In
November 1998, Wired magazine selected Ian as one of the "Wired
25"--the twenty-five people who in 1998 are "about to change the
rules all over again."
|