Keynote Speakers:

  • Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada

    Dr. Ann Cavoukian
  • Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. Her Privacy by Design framework seeks to proactively embed privacy into the design specifications of information technologies and business practices, thereby achieving the strongest protection possible. In October 2010, regulators at the conference of International Data Protection and Privacy Commissioners in Jerusalem unanimously passed a Resolution recognizing Privacy by Design as an essential component of fundamental privacy protection. This was followed by the U.S. Federal Trade Commission’s inclusion of Privacy by Design as one of three recommended practices for protecting online privacy – a major validation of its significance.
    In November 2011, Dr. Cavoukian was ranked as one of the top 25 Women of Influence, recognizing her contribution to the Canadian and global economy. In October 2013, she was named one of the top 100 City Innovators Worldwide by UBM Future Cities for her passionate advocacy of Privacy by Design. In December 2013, the Founding Partners of the Respect Network, the world’s first peer-to-peer network for personal and business clouds, named Dr. Cavoukian as its first Honorary Architect. She is now tackling Big Data, for which she says, “Big Privacy” is the answer.


    Title: Get Smart: Embed Privacy, by Design to Avoid the Risk of Unintended Consequences

    Abstract:Big Data – big opportunity or big risk? Protecting the privacy of individuals within datasets, including the accurate use of their information, has become a critical mission for those wishing to utilize this technology. Big Data will require Big Privacy – far more than the systemic protection of personal information, Big Privacy will ensure that individuals are able to assert control over their data. Big Privacy rests on the foundation of Privacy by Design (PbD), a doubly-enabling approach to privacy that has become an international standard. Come hear Commissioner Cavoukian describe how the principles of PbD underpin thoughtfully architected Big Data systems, helping to mitigate risk and drive value. Welcome to the future!


  • Dr. Rei Safavi-Naini, AITF Strategic Chair in Information Security and Professor of Computer Science, University of Calgary, Alberta, Canada

    Dr. Rei Safavi-Naini
  • Dr. Rei Safavi-Naini ‎is the AITF Strategic Chair in Information Security at the University of Calgary, Canada. Before joining University of Calgary in 2007, she was a Professor of Computer Science, Faculty of Informatics and the Director of Telecommunication and Information Technology Research Institute (TITR) and Centre for Information Security at the University of Wollongong, Australia. She has served on the program committees of major conferences in cryptology and information security including CRYPTO, EUROCRYPT, ASIACRYPT, and ACM CCS and has worked on numerous industry collaborative research projects. Currently, she is director of iCORE Information Security Lab, AITF Strategic Chair in Information Security, and co-Director of the Institute for Security, Privacy and Information Assurance.
    She received a PhD in Electrical and Computer Engineering - coding theory under supervision of Prof. Ian F. Blake from University of Waterloo, Canada, after completing her BSc and MSc in Electrical Engineering in University of Tehran. Her current research interests include information theoretic security, provable security, network security, digital and privacy rights management, and multimedia security.


    Title: Private Communication without Computational Assumptions

    Abstract:Modern cryptography assumes computationally bounded adversaries and bases security on hardness assumptions of mathematical problems. Exponential growth in information and communication technologies and availability of massive computational resources at one’s fingertips, combined with developments in algorithms, raises the question of securing communication if no computational assumption can be made. Information theoretic cryptography bases security on physical assumptions: assuming that part of the state of a physical system is not accessible to the adversary. In this talk we consider the problem of private communication when Alice and Bob do not have a shared key, and explore solutions that rely on multiple paths in communication.