⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http:^^www.cs.columbia.edu^~maggie^

📁 This data set contains WWW-pages collected from computer science departments of various universities
💻 EDU^~MAGGIE^
字号:
Date: Tue, 26 Nov 1996 02:49:19 GMT
Server: Apache/1.1.1
Content-type: text/html
Content-length: 8100
Last-modified: Wed, 20 Nov 1996 05:31:34 GMT

<HTML><HEAD> <TITLE> Maggie M. Lee </TITLE><LINK REV="made" HREF="mailto:maggie@cs.columbia.edu"><script language="Javascript"></script></HEAD><BODY bgcolor=white><!WA0><IMG SRC="http://www.cs.columbia.edu/~maggie/mei.gif" ALT="" WIDTH=180 HEIGHT=200><!WA1><img src="http://www.cs.columbia.edu/~maggie/ushield50.gif"><P><H1> Maggie M. Lee </H1><B> Graduate Student, </B> <BR> <!WA2><A HREF="http://www.cs.columbia.edu/">Computer Science Department</A>,<!WA3><A HREF="http://www.seas.columbia.edu/">School of Engineering and Applied Science</A>,<!WA4><A HREF="http://www.columbia.edu/">Columbia University</A>. <P><B> Research Advisors: <!WA5><a href="http://www.cs.columbia.edu/~moti">Dr. Moti Yung</a> and <!WA6><A HREF="http://www.cs.columbia.edu/~galil/"> Dean Zvi Galil</A> </B><HR><H2> Research Interests </H2><DL><DT> <B> Network Security </B><BR><ul><li> Electronic Commerce<li> Firewalls and Proxies<li> Cryptanalysis<li> Key Escrow</ul><DT> <B> Cryptography </B><BR><DD> As defined by Diffie and Hellman in the classical paper "New Directions in Cryptography", cryptography is the study of "mathematical" systems for solving two security problems: privacy and authentication.  Topics in Cryptography include:<ul><li> Private Key Crypto Systems<li> Public Key Crypto Systems<li> Digital Signatures<li> Pseudo Random Number Generators<li> Probabilistic Encryption<li> Secret Sharing<li> Zero Knowledge Protocol<li> Number Theory</ul><DT> <B> Kerberos Authentication Service </B> <BR><DD> Kerberos is an distributed authentication service used in a client-server environment where a trusted third-party service is used to verify theidentities of users or clients.  The Kerberos authentication model is basedin part on the Needham and Schroeder key distribution protocol with theaddition of timestamps.  It uses the Data Encryption Standard in CipherBlock Chaining mode.  Kerberos was implemented at Project Athena at MIT in1986.  The latest version of MIT Kerberos is Version 5 Beta 7.  Specifications can be found in RFC 1510.<DD>In Greek mythology, Kerberos is the three-headed dog that guarded the entrance to Hades.  It is also known as Cerberus in Roman.  Kerberos appeared in Dante's Inferno.  (Lit Hum finally pays off!)</DL><HR><H2> Teaching Assistant </H2>Office Hours: Tue 4:00-6:00pm<br>Location: Student Research Lab, Computer Science Department<ul><li> CS4115 Programming Language Translators - Prof. Mukesh Dalal<li> CS1007 Introduction to Computer Science - Prof. Thanasis Tsantilas</ul>Previous classes: Calculus I, Calculus II and Introduction to Programming (9 classes)<HR><H2> Graduate Course Work </H2><ul><li> CS4118 Operating Systems - Prof. Dan Duchamp<li> CS4701 Artificial Intelligence - Prof. Stolfo<li> CS4115 Programming Language Translators - Prof. Gail Kaiser<li> CS4705 Natural Language Processing - Dr. Dianne Litman<li> CS6998 Computer Security - Dr. Matt Blaze<li> CS6998 Advanced Cryptography - Dr. Moti Yung<li> CS6999 Computer Science Projects - Dr. Moti Yung, Dean Zvi Galil<li> E6998-043 Advanced Internet Services - Prof. Henning Schulzrinne<li> W4231 Analysis of Algorithms - Prof. Milena Mihail</ul><HR><H2> Skills </H2><ul><li> Building <b>Kerberos</b> Authentication Servers (MIT Kerberos Version 5 Beta 7)<li>Designing and building <b>Firewalls</b> using the TIS firewall toolkit etc.<li> Building and maintaining World Wide Web servers (Apache, CERN, Netscape, NT)<li> Designing artistic and innovative Web pages<li> Building <b>Proxy</b> servers using SOCKS5 and socksifying applications like httpd<li> Building and maintaining Internet news server (INN 1.4)<li> Configuring and debugging Internet services such as DNS, NFS, NIS(YP)<li> Building <b>Anonymous Remailer</b> servers (Mixmaster 2.0.3)<li> Performing system and network administration on SunOS, Solaris, AIX, IRIX<li> Programming in CGI and JAVA (and of course C, Lisp, Pascal and Fortran!)<li> Managing MIT Project Athena software: Kerberos, OLC, Zephyr, Hesiod, etc.<li> Managing AFS (Andrew File System)</ul>I am learning about NT and BSDI...<HR><H2> Projects </H2><ul><li> <b>Top Priority</b>: I am currently working on the <b>Multi-Authority Secret-Ballot Elections</B> Project which is led by my advisor Moti Yung.<li>Implementing DNS service records to allow per-domain definitionof services such as WWW, ftp, telephony and the like.  Dynamic DNS - Implementing directory service in DNS for Internet telephony.  Secure DNS.<li>Packet Radio: Implemented a packet audio receiver (also known as the most expensive AM/FM radio available).  This "radio" receives RTP(Real Time Protocol)-over-UDP packets from either a multicast or unicast address and plays them back to the audio device. <li>I am the Webmaster for the <!WA7><a href="http://www.learn.columbia.edu/Amiens.html">the Amiens</a>.<li>I have recently helped to wire T1 connections and set up a full-service NT server in a residential building in the East Village (Avenue A and Third Street).  This building is the first residential building in New York City to have direct Internet connections.  This project was introduced on CNN a few months ago.<li>I have just finished writing the Multi-Screen On-line Ordering System for Domino's Pizza.  I almost had to apply Artificial Intelligence to deal with their specials!</ul><HR><H2> Links to Cryptography-related Topics </H2><!WA8><a href="http://www.cs.columbia.edu/~moti">Moti Yung</a>'s Home Page <br><!WA9><a href="http://theory.lcs.mit.edu/~rivest/crypto-security.html#p">Ron Rivest</a>'s Cryptography and Security <br><!WA10><a href="http://www.iacr.org/~iacr/conferences/ec97">Eurocrypt '97</a><br><!WA11><a href="http://www.iacr.org/~iacr/conferences/ec96/ec96.html">Eurocrypt '96</a><br><!WA12><a href="http://www.iacr.org/~iacr/conferences/c96/crypto96.html">Crypto '96</a><br><!WA13><a href="http://www.utm.edu:80/research/primes/largest.html">The Largest Known Primes</a><br><!WA14><a href="http://www.zurich.ibm.com/Technology/Security/extern/kryptoknight/">KryptoKnight</a><br><!WA15><a href="http://www.digicrime.com"> Crypto Jokes </a><p><HR><H2> Publications and Thesis </H2><DL><DT> <B> Under major construction... </B></DL><HR><H2>Background</H2><P>High School: <!WA16><A HREF="http://www.school.net.hk/kc/">King's College</A>, Hong Kong.<P>Bachelor of Science in Computer Science from <!WA17><A HREF="http://www.columbia.edu">Columbia University</A> <P>Member of <b>Tau Beta Pi</b> (National Engineering Honor Society) <P>Home Town: <!WA18><A HREF="http://www.cs.columbia.edu/~maggie/hk.html">Hong Kong</A>.<P>Full-Time Work Experience:<br><ul><li>IBM T.J. Watson Research Center - <i> The Agora Project </i><br><li>CS First Boston Corporation<br><li>Goldman Sachs<br></ul><i> Resume available upon request </i><HR><H2> Contact Information </H2><DL><DT> <B> Address: </B><DD>S.W. Mudd Building,<DD>Computer Science Department,<DD>Columbia University,<DD>New York, NY 10027, USA.<DT> <B> E-mail: </B><DD> <!WA19><A HREF="mailto:maggie@cs.columbia.edu">maggie@cs.columbia.edu</A><DD><DT><B>PGP Key Fingerprint:</B>9F 66 3E A1 57 3D 23 48  77 3C 49 EF 5D 9B B8 4C<DD><DT> <!WA20><a href="http://www.cs.columbia.edu/~maggie/pgp.txt"> PGP Public Key </a></DL><HR><H2> Fun Stuff... (when I try to stay away from computers)</H2><!WA21><a href="http://www.cs.columbia.edu/~maggie/studio.html">Maggie's Studio</a><!WA22><img src="http://www.cs.columbia.edu/~maggie/dbnew.gif"><br>Playing Piano (Classical Music)<BR>Roller Blading in Central Park<BR>New York City's Best <!WA23><A HREF="http://www.netatomic.com/dining/index.html">Dining Guide</A><BR><!WA24><a href="http://www.totalny.com">Total New York</a><br>"Columbia's <!WA25><a href="http://www.cs.columbia.edu/~maggie/">Miller Theatre</a>, the city's hottest hotbed of innovative programming..." <i>The New Yorker, October 96</i> <br>My favorite bars in New York City: Au Bar and the Wisky Bar <br><!WA26><A HREF=http://www.cs.columbia.edu/~maggie/guestbook.html> <I><B>Be my guest!</B></I></A><P><HR><I> Back to<!WA27><A HREF="http://www.cs.columbia.edu/">Computer Science</A>,<!WA28><A HREF="http://www.seas.columbia.edu/">School of Engineering and Applied Science</A>,<!WA29><A HREF="http://www.columbia.edu">Columbia University</A>. </I><HR><I>Last updated: 1996/11/05</I><br><I>Created: 1995/10/22</I><ADDRESS>Maggie M. Lee, maggie@cs.columbia.edu</ADDRESS></BODY></HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -