PhD student Sandra Kopecky to present cybersecurity paper at London Computing Conference

PhD student Sandra Kopecky will be presenting her paper “Cyber Security Paradox from a User’s View Point” at Computing Conference in London this summer.

The conference, sponsored by IEEE, will see Sandra presenting her work to an international audience of peers. The publication of the paper will fulfil one of the dissertation requirements and put Sandra one step closer to earning her Doctor of Philosophy in Computer Science.

“I was ecstatic to receive acceptance notice,” Sandra said. “This is an SAI-IEEE conference, and I’m going to be presenting my paper along with others in a session at this conference. Wow!! I haven’t done that before.”

Given that Sandra was the sole author of the paper, having it accepted for publication and presentation at the conference is a big deal.

“I’ve been on various panels discussing cyber security, women in the engineering/computer field, my view point as a college student – at various levels, and my background. But never to present my work,” Sandra said.

So why did Sandra choose a unique topic like cybersecurity from a user’s point of view?

“There is much written and researched, however the point of view is almost always from a company’s point of view and the user just has to accept it, no questions asked,” Sandra explained. “Cybersecurity affects everyone in every field across the board. I decided to look at this from a different point of view: that of the user. This paper is the beginnings of that broader topic.”

Sounds like a great paper – the idea of ‘user first’ is no stranger to user experience and human-computer interaction, and it’s certainly interesting to hear about one of our students considering the user’s viewpoint when it comes to cybersecurity, too. Enjoy the conference, Sandra, and we can’t wait to hear about it when you get back!

Celebrating our latest PhD success: Dr. Mohammad “Vahid” Vahidalizadehdizaj!

We are delighted to share that Mohammad “Vahid” Vahidalizadehdizaj has freshly earned the title of “Dr.” following the successful defense of his PhD thesis!

A student of the PhD in Computer Science program, Vahid chose to explore security and privacy in e-commerce over mobile phones. This is an issue that requires continuous attention, and a very worthy one of doctoral level study.

Dr. Lixin Tao was the advisor for Vahid’s journey to doctorate. The committee was comprised of Dr. Charles Tappert and Dr. Mehdi Badii; Professor Avery Leider and fellow PhD candidate, Nikhil Saxena, were also present – and Professor Leider took several videos to document the moment!

“It was fun watching Vahid defend and defend his thesis against all comers,” said Prof. Leider.

Vahid is our second ever student to earn a PhD, joining Dr. Vinnie Monaco as one of our incredible PhD alums.

The new Dr. Vahidalizadehdizaj said: “I want to thank my mother and father for supporting me on this road. I want to thank Dean Jonathan Hill and Dr. Paul Benjamin for their guidance. I want to thank my advisor, Dr. Lixin Tao for his advice. I want to thank my wonderful committee members Dr. Charles Tappert and Dr. Badii for their wise comments and questions.”

Here’s the abstract of Vahid’s dissertation, “An Efficient Decentralized Mobile Payment Protocol With Improved Security and Privacy”:

The exponential growth of mobile devices makes them a suitable computing platform for electronic payment. However, there are serious challenges in e-commerce transactions, such as privacy protection, security, bandwidth limitations of mobile networks, and limited capabilities of mobile devices to handle excess or indirect computational time. The traditional e-commerce payment protocols that were originally designed to keep track of the traditional flows of data from desktop computers are vulnerable to attacks, and because they were not designed for mobile platforms, have excessive engineering overhead. In this thesis, a new private mobile payment protocol is introduced that is designed specifically for the mobile platform. It is based on a client-centric model that utilizes symmetric key operations. The protocol reduces the computational cost (the engineering overhead) of Diffie-Hellman key agreement protocol by using the algebra of logarithms instead of the algebra of exponents. The protocol achieves proper privacy protection for the payer by involving mobile network operators and generating temporary identities. It avoids replay attacks by using random time-stamp generated numbers.

Congratulations Dr. Vahid – we can’t wait to see where your new qualification takes you!

Skip to toolbar