{"id":72,"date":"2023-04-28T22:12:26","date_gmt":"2023-04-28T16:42:26","guid":{"rendered":"http:\/\/iciss.isrdc.in\/?page_id=72"},"modified":"2023-09-07T23:59:45","modified_gmt":"2023-09-07T18:29:45","slug":"keynotes","status":"publish","type":"page","link":"https:\/\/iciss.isrdc.in\/keynotes\/","title":{"rendered":"Keynotes &#038; Invited Talks"},"content":{"rendered":"\n<p>The ICISS steering committee is in the process of formally finalising the keynote speakers for ICISS 2023.<\/p>\n\n\n\n<ul><li><strong>hinTS: Threshold Signatures with Silent Setup<\/strong> (<a href=\"https:\/\/iciss.isrdc.in\/keynote-by-sanjam-garg\/\">abstract<\/a>)<br>by <a rel=\"noreferrer noopener\" href=\"https:\/\/people.eecs.berkeley.edu\/~sanjamg\/\" data-type=\"URL\" data-id=\"https:\/\/people.eecs.berkeley.edu\/~sanjamg\/\" target=\"_blank\">Sanjam Garg<\/a>, University of California, Berkeley<\/li><li><strong>How to Train and Use AI Models on Sensitive Data without Compromising Privacy?<\/strong> (<a href=\"https:\/\/iciss.isrdc.in\/keynote-by-nishanth-chandran\/\">abstract<\/a>)<br>by <a rel=\"noreferrer noopener\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\" data-type=\"URL\" data-id=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\" target=\"_blank\">Nishanth Chandran<\/a>, Microsoft Research, India<\/li><li><strong>Follow the Money<\/strong> (<a href=\"https:\/\/iciss.isrdc.in\/invited-talk-by-thomas-silkjaer\/\">abstract<\/a>)<br>by <a rel=\"noreferrer noopener\" href=\"https:\/\/medium.com\/@silkjaer\" data-type=\"URL\" data-id=\"https:\/\/medium.com\/@silkjaer\" target=\"_blank\">Thomas Silkj\u00e6r<\/a>, XRP Ledger Foundation<\/li><li><strong>Covert &amp; Side Stories: Threats Evolution in Traditional and Modern Technologies<\/strong> (<a href=\"https:\/\/iciss.isrdc.in\/invited-talk-by-mauro-conti\/\">abstract<\/a>)<br>by <a rel=\"noreferrer noopener\" href=\"https:\/\/www.math.unipd.it\/~conti\/\" target=\"_blank\">Mauro Conti<\/a>, University of Padua, Italy<\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ICISS steering committee is in the process of formally finalising the keynote speakers for ICISS 2023. hinTS: Threshold Signatures with Silent Setup (abstract)by Sanjam Garg, University of California, Berkeley How to Train and Use AI Models on Sensitive Data without Compromising Privacy? (abstract)by Nishanth Chandran, Microsoft Research, India Follow the Money (abstract)by Thomas Silkj\u00e6r, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/72"}],"collection":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/comments?post=72"}],"version-history":[{"count":12,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/72\/revisions"}],"predecessor-version":[{"id":1042,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/72\/revisions\/1042"}],"wp:attachment":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/media?parent=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}