Events
Subhro Ghosh (National University of Singapore) – The Unreasonable Effectiveness of Negative Association
Subhro Ghosh (National University of Singapore) – The Unreasonable Effectiveness of Negative Association
Aadhaar Chaturvedi (The University of Auckland Business School) – Contracting and Information Sharing in Supply Chains with a Common Retailer & Competing Manufacturers
Aadhaar Chaturvedi (The University of Auckland Business School) – Contracting and Information Sharing in Supply Chains with a Common Retailer & Competing Manufacturers
17th International Conference on Magnetic Resonance Microscopy 2023
The 17th ICMRM will be held from 27 to 31 August 2023 in Singapore at the Singapore University Technology & Design (SUTD). The aim of the ICMRM is to promote recent advancements in high-resolution, spatially resolved magnetic resonance methods and applications.
WiOpt 2023
WiOpt 2023
HASS Conversations in Design, Technology, and Society Series | Hazardous Data: The Entanglements of Digital Debt in India
HASS Conversations in Design, Technology, and Society Series | Hazardous Data: The Entanglements of Digital Debt in India
Lavanya Marla (University of Illinois at Urbana-Champaign) – Greedy Policies and Penalized Information-Relaxation Bounds for EMS: Allocation and Performance Assessment
Lavanya Marla (University of Illinois at Urbana-Champaign) – Greedy Policies and Penalized Information-Relaxation Bounds for EMS: Allocation and Performance Assessment
Feng Li (Shandong University) – Distributed Intelligence: From An Algorithmic Perspective
Feng Li (Shandong University) – Distributed Intelligence: From An Algorithmic Perspective
Eugene Lim (GOVTECH) – Reverse Engineering Cryptographic Implementations in Software and Teo Sui Guan (GOVTECH) – Cryptography and its use in Government
Encryption is used everywhere in software, from custom network protocols to password vaults. We will walk through the process of reverse-engineering software to identify encryption protocols and analysing them for vulnerabilities through real-world applications. We will look at common encryption patterns in source code as well as common mistakes made by developers.
[Public Lecture] Security and Privacy of IoT Apps and Devices
Click here to view lecture slides.
HASS Colloquium Series: Intersecting research and pedagogy: Structures of control and empowerment by Dr Roslynn Ang
HASS Colloquium Series: Intersecting research and pedagogy: Structures of control and empowerment by Dr Roslynn Ang