{"id":575,"date":"2023-03-08T19:08:35","date_gmt":"2023-03-08T19:08:35","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/03\/08\/marten-van-dijk-2023-ieee-cs-edward-j-mccluskey-award\/"},"modified":"2023-03-08T19:08:35","modified_gmt":"2023-03-08T19:08:35","slug":"marten-van-dijk-2023-ieee-cs-edward-j-mccluskey-award","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/03\/08\/marten-van-dijk-2023-ieee-cs-edward-j-mccluskey-award\/","title":{"rendered":"Marten van Dijk 2023 IEEE CS Edward J. McCluskey Award"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive alignright wp-image-334598\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/01081916\/vanDijk.jpg\" alt=\"\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/01081916\/vanDijk.jpg 300w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/01081916\/vanDijk-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/01081916\/vanDijk-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/><\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><strong>LOS ALAMITOS, Calif., 8 March 2023<\/strong> \u2013 Marten van Dijk has been selected to receive the <strong>2023 IEEE Computer Society (IEEE CS) Edward J. McCluskey Technical Achievement Award <\/strong>and was cited \u201cfor contributions to oblivious and encrypted computation.\u201d Other winners this year are Luca Benini, Kristen Grauman, and Minyi Guo.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Marten van Dijk (CWI, VU, UConn) said, \u201cI am honored to be recognized for my work in oblivious and encrypted computation, see its impact, and how the results have been used by many colleagues in their research. Both for computation under encryption and for oblivious RAM we found simple constructions that can easily be explained, even to undergraduate students. I think this helped their accessibility.\u201d<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">At CWI, the national research institute for mathematics and computer science in the Netherlands, Marten van Dijk has founded and heads the Computer Security research group. He is also an endowed professor at Vrije Universiteit Amsterdam in secure and intelligent computing and a research professor at the University of Connecticut. He has over 20 years of research experience in secure computation. He acquired this experience both in academia (Massachusetts Institute of Technology and the University of Connecticut) and in industry (Philips Research and RSA Laboratories). Marten van Dijk is an IEEE Fellow for his contributions to secure processor design and encrypted calculations.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Earlier, Marten van Dijk received the A. Richard Newton Technical Impact Award in Electronic Design Automation (2015) and the Most Frequently Cited Paper Award (2000-2009), Symposium on VLSI Circuits, for his collaboration that introduced silicon Physical Unclonable Functions.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Aegis, the first single-chip secure processor that encrypts and verifies the integrity of external memory and introduced the concept of secure containers, was selected for inclusion in \u201825 years of International Conference on Supercomputing\u2019 in 2014 and got a Test of Time Award from Intel in 2022. This concept is in widespread use in Trusted Execution Environments (TEEs), such as the Intel SGX processor, which can be found nowadays in industry.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The RAM protocol \u2018Path ORAM\u2019 received a best paper award at CCS 2013 and was selected as a 2018 Top Pick in Hardware and Embedded Security. \u2018Fully Homomorphic Encryption over the integers\u2019 was nominated for best paper award at Eurocrypt 2010 and is his most cited paper (according to Google Scholar).<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The Edward J. McCluskey Technical Achievement Award includes a certificate and $2,000 honorarium presented for outstanding and innovative contributions to the fields of computer and information science and engineering or computer technology, usually within the past 10 and not more than 15 years.<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><strong>About the IEEE Computer Society<\/strong><\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Through conferences, publications, and programs, the IEEE Computer Society (IEEE CS) sets the standard for the education and engagement that fuels global technological advancement. By bringing together engineers, scientists, researchers, and practitioners from all areas of computing and at every career phase, the IEEE CS enables new opportunities and empowers not only its members but also the greater industry. Visit\u00a0computer.org\u00a0for more information.<\/p>\n<\/p><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/press-room\/marten-van-dijk-recipient-of-ieee-cs-edward-j-mccluskey-technical-achivement-award\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] \u00a0 LOS ALAMITOS, Calif., 8 March 2023 \u2013 Marten van Dijk has been selected to receive the 2023 IEEE&hellip;<\/p>\n","protected":false},"author":1,"featured_media":576,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[555,556,83,2],"tags":[],"class_list":["post-575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-edward-j-mccluskey-technical-achievement-award","category-mcclusky-award","category-press-release","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/575\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/576"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}