BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20230312T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20231011T180108Z
UID:08C5ED92-BCB9-4405-9107-A6B85F7E2E0D
DTSTART;TZID=US/Eastern:20231004T163000
DTEND;TZID=US/Eastern:20231004T173000
DESCRIPTION:With the prosperity of edge computing\, massive users and devic
 es at the network edge are more actively involved in the networks\, pushin
 g the information collection\, computation\, storage\, and communications 
 more towards end users. In these more decentralized systems\, how to enabl
 e efficient and trustworthy interactions among different parties becomes a
 n essential issue.\n\nBlockchain has been considered as a promising approa
 ch to facilitate the establishment of decentralized trustworthy computing 
 systems with non-repudiated information records. For example\, Bitcoin has
  attracted wide attention as a secure and decentralized platform to enable
  peer-to-peer exchanges of digital currency. Ethereum then generalizes blo
 ckchain as a state machine and enables smart contracts\, a piece of code t
 hat can support complex logic and be self-executed when certain conditions
  are met. Such generalization enables blockchain to potentially serve as a
  computing infrastructure and opens new opportunities for blockchain to fa
 cilitate secure and decentralized interactions among any parties without m
 aking high trust assumptions about them.\n\nIn this talk\, we will discuss
  some key characteristics of blockchain and a few promising applications o
 f blockchain that can facilitate security and trust among multiple parties
 . Some examples include applying blockchain to secure software updates for
  resource-constrained IoT networks\; designing a secure and efficient mult
 i-signature scheme to facilitate multi-party approval process on Fabric\, 
 an enterprise blockchain platform\; facilitating fair trading of digital-g
 oods via a blockchain based proxy re-encryption scheme.\n\nCo-sponsored by
 : New Jersey Institute of Technology\n\nSpeaker(s): Dr. Yuhong Liu\, \n\nA
 genda: \nWith the prosperity of edge computing\, massive users and devices
  at the network edge are more actively involved in the networks\, pushing 
 the information collection\, computation\, storage\, and communications mo
 re towards end users. In these more decentralized systems\, how to enable 
 efficient and trustworthy interactions among different parties becomes an 
 essential issue.\n\nBlockchain has been considered as a promising approach
  to facilitate the establishment of decentralized trustworthy computing sy
 stems with non-repudiated information records. For example\, Bitcoin has a
 ttracted wide attention as a secure and decentralized platform to enable p
 eer-to-peer exchanges of digital currency. Ethereum then generalizes block
 chain as a state machine and enables smart contracts\, a piece of code tha
 t can support complex logic and be self-executed when certain conditions a
 re met. Such generalization enables blockchain to potentially serve as a c
 omputing infrastructure and opens new opportunities for blockchain to faci
 litate secure and decentralized interactions among any parties without mak
 ing high trust assumptions about them.\n\nIn this talk\, we will discuss s
 ome key characteristics of blockchain and a few promising applications of 
 blockchain that can facilitate security and trust among multiple parties. 
 Some examples include applying blockchain to secure software updates for r
 esource-constrained IoT networks\; designing a secure and efficient multi-
 signature scheme to facilitate multi-party approval process on Fabric\, an
  enterprise blockchain platform\; facilitating fair trading of digital-goo
 ds via a blockchain based proxy re-encryption scheme.\n\nBldg: GITC 4402\,
  University Heights\, New Jersey Institute of Technology\, Newark\, New Je
 rsey\, United States\, 07102
LOCATION:Bldg: GITC 4402\, University Heights\, New Jersey Institute of Tec
 hnology\, Newark\, New Jersey\, United States\, 07102
ORGANIZER:zhao@fdu.edu
SEQUENCE:31
SUMMARY:Facilitating Security and Trust among Multiple Parties through Bloc
 kchain Techniques
URL;VALUE=URI:https://events.vtools.ieee.org/m/376105
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;With the prosperity of edge computing\, ma
 ssive users and devices at the network edge are more actively involved in 
 the networks\, pushing the information collection\, computation\, storage\
 , and communications more towards end users. In these more decentralized s
 ystems\, how to enable efficient and trustworthy interactions among differ
 ent parties becomes an essential issue.&lt;/p&gt;\n&lt;p&gt;Blockchain has been consid
 ered as a promising approach to facilitate the establishment of decentrali
 zed trustworthy computing systems with non-repudiated information records.
  For example\, Bitcoin has attracted wide attention as a secure and decent
 ralized platform to enable peer-to-peer exchanges of digital currency. Eth
 ereum then generalizes blockchain as a state machine and enables smart con
 tracts\, a piece of code that can support complex logic and be self-execut
 ed when certain conditions are met. Such generalization enables blockchain
  to potentially serve as a computing infrastructure and opens new opportun
 ities for blockchain to facilitate secure and decentralized interactions a
 mong any parties without making high trust assumptions about them.&lt;/p&gt;\n&lt;p
 &gt;In this talk\, we will discuss some key characteristics of blockchain and
  a few promising applications of blockchain that can facilitate security a
 nd trust among multiple parties. Some examples include applying blockchain
  to secure software updates for resource-constrained IoT networks\; design
 ing a secure and efficient multi-signature scheme to facilitate multi-part
 y approval process on Fabric\, an enterprise blockchain platform\; facilit
 ating fair trading of digital-goods via a blockchain based proxy re-encryp
 tion scheme.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;With the prosperity of edge c
 omputing\, massive users and devices at the network edge are more actively
  involved in the networks\, pushing the information collection\, computati
 on\, storage\, and communications more towards end users. In these more de
 centralized systems\, how to enable efficient and trustworthy interactions
  among different parties becomes an essential issue.&lt;/p&gt;\n&lt;p&gt;Blockchain ha
 s been considered as a promising approach to facilitate the establishment 
 of decentralized trustworthy computing systems with non-repudiated informa
 tion records. For example\, Bitcoin has attracted wide attention as a secu
 re and decentralized platform to enable peer-to-peer exchanges of digital 
 currency. Ethereum then generalizes blockchain as a state machine and enab
 les smart contracts\, a piece of code that can support complex logic and b
 e self-executed when certain conditions are met. Such generalization enabl
 es blockchain to potentially serve as a computing infrastructure and opens
  new opportunities for blockchain to facilitate secure and decentralized i
 nteractions among any parties without making high trust assumptions about 
 them.&lt;/p&gt;\n&lt;p&gt;In this talk\, we will discuss some key characteristics of b
 lockchain and a few promising applications of blockchain that can facilita
 te security and trust among multiple parties. Some examples include applyi
 ng blockchain to secure software updates for resource-constrained IoT netw
 orks\; designing a secure and efficient multi-signature scheme to facilita
 te multi-party approval process on Fabric\, an enterprise blockchain platf
 orm\; facilitating fair trading of digital-goods via a blockchain based pr
 oxy re-encryption scheme.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

