Announcement

Message

Call For Papers

For Authors Only

Final Programme

Keynote Address
Tutorial

Conference  Registration

Accommodation/Tours

Organizers

General Information

FAQ
 
 
 
For Enquiries:
icon2004@sp.edu.sg
 
Organised by:

In co-operation with:

National University of Singapore

Nanyang Technological University

 

Sponsored by:

 
 
 

 


 

Hilton Singapore

     
TUTORIAL PROGRAMME  
 

 

 

 

   

    November 16, 2004 

Tuesday,  9am-5pm Tutorial 2, 3
    November 19, 2004 Friday,  9am-5pm Tutorial 5
 
 

Registration for tutorial 2 and 3 will be opened till: November 16, 2004

Registration for tutorial 5 will be opened till: November 19, 2004

Tutorial 1 and 4 will not be run.

   

  Tutorial 2
   

Dr. Raj Jain

Co-Founder and CTO

Nayna Networks (San Jose, CA, USA)

 
 

 

Title - Broadband Metro and Access Networks

 

Instructor - Dr Raj Jain (jain@acm.org) is the Co-founder and Chief Technology Officer of Nayna Networks, Inc - a next generation broadband access equipment company in San Jose, CA. Dr. Jain is an Adjunct Professor at Ohio State University in Columbus, a Fellow of IEEE, a Fellow of ACM and is on the Board of Technical Advisors to Teradiant Networks, San Jose, CA, Avatar Networks, Fremont, CA, and Rhonet Systems, Columbus, OH. He has been a keynote speaker at many conferences. Based on his active participation in the computer industry, Dr. Jain was awarded 1999 SiliconIndia Leadership Awards for Excellence and Promise in Business and Technology. For his publications and talks, see http://www.cse.ohio-state.edu/~jain

 

Synopsis - This tutorial covers the key technological developments in broadband networking in metro and access carrier networks. The role of 10 Gigabit Ethernet standard in unifying the local and wide area networks will be presented. The features that make Next Generation SONET a tough competitor for Ethernet in the carrier metro networks will be explained. The efforts underway to make Ethernet suitable for carrier network deployment will be described. Basics of DSL operation and cable modems will be covered. Upcoming standards on Broadband wireless access and mobile broadband wireless access and the role of WiMAX in accelerating their deployments will be explained. Optical Access using passive optical networks and free-space optics will also be briefly presented.                   

download full synopsis

 

 

Back to top

 

  Tutorial 3
   

A/Prof. Ray Hunt

University of Canterbury, New Zealand

 

 
 

 

Title - Security in Wireless and Mobile Network Architecture

 

Instructor - A/Prof. Ray Hunt is an Associate Professor with the Department of Computer Science and Software Engineering at the University of Canterbury, New Zealand. He is well known for his expertise in network and security and has provided numerous training courses, addressed a variety of conferences and acted as a telecommunications consultant for a number of telcos and other companies.

 

Synopsis - This tutorial will cover a number of very pertinent topics of interest in the area of Wireless LAN and WAN security and examines some of the real security issues facing Wireless LAN and Wireless WAN network users. The tutorial commences by examining local and wide area lower layer wireless and mobile infrastructure including the types of threats that they face. It then proceeds to examine the protocols and architecture that go to make up the security infrastructure for these wireless and mobile networks. Finally issues such as WLAN/WWAN (3G) integration and handoff, Quality of Service performance, wireless profiled TCP and security testing and evaluation procedures will be covered.      

download full synopsis

  Back to top
 

  Tutorial 5
   

Dr.  Radia Perlman

Distinguished Engineer  

Sun Microsystems

 
 

 

Title - Principles of Network Security Protocols

 

Instructor - Dr. Radia Perlman is known for her contributions to bridging (spanning tree algorithm) and routing (robust and scalable link state routing) as well as security (sabotage-proof networks). Her current area of research focuses on network security protocols, including PKI models, credentials download, strong password protocols, and  analysis and redesign of IPsec's authentication protocol. She is one of the 25 people whose work has most influenced the networking industry, according to Data Communications Magazine. She has about 70 issued patents, an S.B. and S.M in mathematics and a Ph.D. in computer science from MIT and an honorary doctorate from KTH.

 

Synopsis - This tutorial introduces the toolkit of tricks used by network security protocols: cryptography, handshakes, and key distribution. It concentrates on the system issues that are not answered by the standards, such as the subtle differences in functionality between systems based on public keys (PKI-based) and systems based on secret keys (e.g., Kerberos), and the real challenges in building a chain of trust from a key you know a priori to a target name. It talks about common mistakes people make when designing or deploying security systems ("how to build an insecure system out of perfectly good cryptography"). And it suggests areas for research.

download full synopsis

  Back to top