Reihaneh Safavi-Naini
Encyclopedia
Reihaneh Safavi-Naini is the iCORE Chair in Information Security at the University of Calgary
University of Calgary
The University of Calgary is a public research university located in Calgary, Alberta, Canada. Founded in 1966 the U of C is composed of 14 faculties and more than 85 research institutes and centres.More than 25,000 undergraduate and 5,500 graduate students are currently...

, Canada
Canada
Canada is a North American country consisting of ten provinces and three territories. Located in the northern part of the continent, it extends from the Atlantic Ocean in the east to the Pacific Ocean in the west, and northward into the Arctic Ocean...

. Before joining University of Calgary in 2007, she was a Professor of Computer Science, Faculty of Informatics and the Director of Telecommunication and Information Technology Research Institute (TITR) and Centre for Information Security at the University of Wollongong
University of Wollongong
The University of Wollongong is a public university located in the coastal city of Wollongong, New South Wales, Australia, approximately 80 kilometres south of Sydney...

, Australia
Australia
Australia , officially the Commonwealth of Australia, is a country in the Southern Hemisphere comprising the mainland of the Australian continent, the island of Tasmania, and numerous smaller islands in the Indian and Pacific Oceans. It is the world's sixth-largest country by total area...

. She has served on the program committees of major conferences in cryptology and information security
Information security
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction....

 including CRYPTO
CRYPTO (conference)
CRYPTO, the International Cryptology Conference, is one of the largest academic conferences in cryptography and cryptanalysis. It is organized by the International Association for Cryptologic Research , and it is held yearly in August in Santa Barbara, California at the University of California,...

, EUROCRYPT
EuroCrypt
EuroCrypt is a conditional access system for Multiplexed Analogue Components-encoded analogue satellite television. It had several versions . It supported receivers with card slots and those with embedded keys...

, ASIACRYPT
Asiacrypt
Asiacrypt is an important international conference for cryptography research. The full name of the conference is currently International Conference on the Theory and Application of Cryptology and Information Security, though this has varied over time...

, and ACM CCS and has worked on numerous industry collaborative research projects. Currently, she is director of iCORE Information Security Lab.

She received a PhD in Electrical and Computer Engineering - coding theory
Coding theory
Coding theory is the study of the properties of codes and their fitness for a specific application. Codes are used for data compression, cryptography, error-correction and more recently also for network coding...

 under supervision of Prof. Ian F. Blake from University of Waterloo
University of Waterloo
The University of Waterloo is a comprehensive public university in the city of Waterloo, Ontario, Canada. The school was founded in 1957 by Drs. Gerry Hagey and Ira G. Needles, and has since grown to an institution of more than 30,000 students, faculty, and staff...

, Canada, after completing her BSc and MSc in Electrical Engineering
Electrical engineering
Electrical engineering is a field of engineering that generally deals with the study and application of electricity, electronics and electromagnetism. The field first became an identifiable occupation in the late nineteenth century after commercialization of the electric telegraph and electrical...

 in University of Tehran
University of Tehran
The University of Tehran , also known as Tehran University and UT, is Iran's oldest university. Located in Tehran, the university is among the most prestigious in the country, and is consistently selected as the first choice of many applicants in the annual nationwide entrance exam for top Iranian...

. Her current research interests include information theoretic security
Information theoretic security
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it is secure even when the adversary has unlimited computing power. The adversary simply does not have enough information to break the security...

, provable security
Provable security
In cryptography, a system has provable security if its security requirements can be stated formally in an adversarial model, as opposed to heuristically, with clear assumptions that the adversary has access to the system as well as enough computational resources...

, network security
Network security
In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources...

, digital and privacy rights management
Digital rights management
Digital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...

, and multimedia security.

External links

  • Home page
  • List of publications on Google Scholar
    Google Scholar
    Google Scholar is a freely accessible web search engine that indexes the full text of scholarly literature across an array of publishing formats and disciplines. Released in beta in November 2004, the Google Scholar index includes most peer-reviewed online journals of Europe and America's largest...

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK