Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse files

updated presentations page

  • Loading branch information...
commit 14b3c941b75ed899f76d2b9b399e52914eb80dc4 1 parent a6438c4
@benadida authored
Showing with 92 additions and 90 deletions.
  1. +76 −89 presentations/index.html
  2. +16 −1 style.css
View
165 presentations/index.html
@@ -4,34 +4,24 @@
<div id="main">
<p>
-The following are presentations that I've given. They are all
+The following presentations are all
available under an <a
-href="http://creativecommons.org/licenses/by-sa/2.5/">Attribution-ShareAlike
-Creative Commons License</a>. This means that you should feel free to
-reuse the contents of these slides (except on slides noted otherwise),
-as long as you give me credit for the stuff you use, and as long as
-you use a similar Creative Commons license if you create a document
-using my slides and you choose to redistribute it. If you want to use
+href="http://creativecommons.org/licenses/by-sa/3.0/">Attribution-ShareAlike
+Creative Commons License</a>.If you want to use
this content under a different license (i.e. without the requirement
to share your derivative work), then you need to contact me.
</p>
<p>
-In order to give proper attribution for these slides, please link
+When reusing these slides, please link
to my main web page (<tt>http://ben.adida.net</tt>).
</p>
-<p>
-Though nothing in the license requires you to let me know if you've
-used these slides, I'm always happy to get feedback of all sorts. Feel free to <a href="mailto:ben@mit.edu">send me email</a> to let me know what you think.
-</p>
-
<h3 class="highlight">2010</h3>
<br />
-<img alt="new" src="new.png" width="60" style="float:left; margin-right:20px;" />
-<h4 id="msr-truly-verifiable-elections-2010-03">Truly Verifiable Elections</h4> [<a href="http://www.slideshare.net/benadida/truly-verifiable-elections">Slideshare</a> | <a href="2010-03-19-truly-verifiable-voting.pdf">PDF</a>]
+<h4 id="msr-truly-verifiable-elections-2010-03">Truly Verifiable Elections</h4> [<a href="http://www.slideshare.net/benadida/truly-verifiable-elections">Slideshare</a> | <a href="http://content.adida.net/presentations/2010-03-19-truly-verifiable-voting.pdf">PDF</a>]
<br />
<small><em>March 19th, 2010</em> &mdash; a talk at <a href="http://research.microsoft.com/en-us/projects/votingworkshop/">Microsoft Research Voting Technology Workshop</a>.</small>
<br /><br />
@@ -40,13 +30,11 @@ <h3 class="highlight">2009</h3>
<br />
-<img alt="new" src="new.png" width="60" style="float:left; margin-right:20px;" />
<h4 id="evtwote2009-efficient-receipt-free-ballot">Efficient, Receipt-Free Ballot Casting Resistant to Covert Channels</h4> [<a href="http://www.slideshare.net/benadida/efficient-receiptfree-ballot-casting-resistant-to-covert-channels">Slideshare</a>]
<br />
<small><em>August 11th, 2009</em> &mdash; a talk at <a href="http://www.usenix.org/event/evtwote09/">EVT/WOTE 2009</a>.</small>
<br /><br />
-<img alt="new" src="new.png" width="60" style="float:left; margin-right:20px;" />
<h4 id="evtwote2009-intro-to-crypto-voting">Cryptography and Voting</h4> [<a href="http://www.slideshare.net/benadida/cryptography-and-voting">Slideshare</a>]
<br />
<small><em>August 11th, 2009</em> &mdash; a talk at <a href="http://www.usenix.org/event/evtwote09/">EVT/WOTE 2009</a>.</small>
@@ -62,7 +50,7 @@ <h4 id="israel2009-voting-security">Voting Security &mdash; an overview</h4> [<a
<small><em>May 17th, 2009</em> &mdash; a talk at the Electronic Voting Workshop in Herzliya, Israel.</small>
<br /><br />
-<h4 id="ucl2009-voting">Open-Audit Voting: How to let anyone verify an election</h4> [<a href="ucl-voting-2009-02-03.pdf">PDF</a> | <a href="http://www.slideshare.net/benadida/openaudit-voting">Slideshare</a>]
+<h4 id="ucl2009-voting">Open-Audit Voting: How to let anyone verify an election</h4> [<a href="http://content.adida.net/presentations/ucl-voting-2009-02-03.pdf">PDF</a> | <a href="http://www.slideshare.net/benadida/openaudit-voting">Slideshare</a>]
<br />
<small><em>February 3rd, 2009</em> &mdash; a guest lecture at the <a href="http://uclouvain.be">Universite Catholique de Louvain</a>.</small>
<br /><br />
@@ -70,39 +58,39 @@ <h4 id="ucl2009-voting">Open-Audit Voting: How to let anyone verify an election<
<h3 class="highlight">2008</h3>
<br />
-<h4 id="harvardcollegefund-voting">Secure Voting</h4> [<a href="harvard-college-fund-2008-10-18.pdf">PDF</a> | <a href="http://www.slideshare.net/benadida/secure-voting">Slideshare</a>]
+<h4 id="harvardcollegefund-voting">Secure Voting</h4> [<a href="http://content.adida.net/presentations/harvard-college-fund-2008-10-18.pdf">PDF</a> | <a href="http://www.slideshare.net/benadida/secure-voting">Slideshare</a>]
<br />
<small><em>October 18th, 2008</em> &mdash; a guest talk at the Harvard College Fund Assembly.</small>
<br /><br />
-<h4 id="iacr2008-helios">Helios: Web-based Open-Audit Voting</h4> [<a href="2008-08-19-helios-iacr.pdf">PDF</a>]
+<h4 id="iacr2008-helios">Helios: Web-based Open-Audit Voting</h4> [<a href="http://content.adida.net/presentations/2008-08-19-helios-iacr.pdf">PDF</a>]
<br />
<small><em>August 19th, 2008</em> &mdash; a talk at the IACR Voting System Session, part of CRYPTO 2008.</small>
<br /><br />
-<h4 id="usec2008-helios">Helios: Web-based Open-Audit Voting</h4> [<a href="2008-08-01-helios-usec2008.pdf">PDF</a>]
+<h4 id="usec2008-helios">Helios: Web-based Open-Audit Voting</h4> [<a href="http://content.adida.net/presentations/2008-08-01-helios-usec2008.pdf">PDF</a>]
<br />
<small><em>August 1st, 2008</em> &mdash; a talk at <a href="http://www.usenix.org/events/sec08/">Usenix Security 2008</a>.</small>
<br /><br />
-<h4 id="w2sp2008-emid">EmID: Web Authentication by Email Address</h4> [<a href="2008-05-22-emid-w2sp2008.pdf">PDF</a>]
+<h4 id="w2sp2008-emid">EmID: Web Authentication by Email Address</h4> [<a href="http://content.adida.net/presentations/2008-05-22-emid-w2sp2008.pdf">PDF</a>]
<br />
<small><em>May 22nd, 2008</em> &mdash; a talk at <a href="http://seclab.cs.rice.edu/w2sp/2008/">W2S&amp;P 2008</a>.</small>
<br /><br />
-<h4 id="crcs2008-websec">The Web Browser as a Platform for Secure Applications</h4> [<a href="2008-05-14-crcs-websec.pdf">PDF</a>]
+<h4 id="crcs2008-websec">The Web Browser as a Platform for Secure Applications</h4> [<a href="http://content.adida.net/presentations/2008-05-14-crcs-websec.pdf">PDF</a>]
<br />
<small><em>May 14th, 2008</em> &mdash; a talk at <a href="http://crcs.seas.harvard.edu">Harvard CRCS</a>.</small>
<br /><br />
-<h4 id="www2008-sessionlock">SessionLock: Securing HTTP Sessions from Eavesdroppers</h4> [<a href="2008-04-24-www2008-sessionlock.pdf">PDF</a>]
+<h4 id="www2008-sessionlock">SessionLock: Securing HTTP Sessions from Eavesdroppers</h4> [<a href="http://content.adida.net/presentations/2008-04-24-www2008-sessionlock.pdf">PDF</a>]
<br />
<small><em>April 24th, 2008</em> &mdash; a talk at <a href="http://www2008.org">WWW2008</a>.</small>
<br /><br />
-<h4 id="www2008-rdfa">RDFa: Bridging the Human and Data Webs</h4> [<a href="www2008-rdfa/">HTML</a>]
+<h4 id="www2008-rdfa">RDFa: Bridging the Human and Data Webs</h4> [<a href="http://content.adida.net/presentations/www2008-rdfa/">HTML</a>]
<br />
<small><em>April 21st, 2008</em> &mdash; a tutorial at <a href="http://www2008.org">WWW2008</a>.</small>
<br /><br />
@@ -115,9 +103,8 @@ <h4 id="google2007-voting">Verifying Elections with Cryptography</h4> [<a href="
<small><em>December 19th, 2007</em> &mdash; a talk at <a href="http://google.com">Google</a>.</small>
<br /><br />
-<br /><br />
<h4 id="ccs2007-beamauth">BeamAuth: Two-Factor Web Authentication with a Bookmark</h4> [
-<a href="ccs2007-beamauth.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/ccs2007-beamauth.pdf">PDF</a>
|
<a href="http://www.slideshare.net/benadida/beamauth-twofactor-web-authentication-with-a-bookmark">Slideshare</a>
]
@@ -127,9 +114,9 @@ <h4 id="ccs2007-beamauth">BeamAuth: Two-Factor Web Authentication with a Bookmar
<br />
<h4 id="crcs-2007-04-18">Web (2.0) Security</h4> [
-<a href="crcs-2007-04-18.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/crcs-2007-04-18.pdf">PDF</a>
|
-<a href="crcs-2007-04-18.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/crcs-2007-04-18.mov">Quicktime</a>
]
<br />
<small><em>April 18th, 2007</em> &mdash; a lunch seminar at Harvard's <a href="http://crcs.deas.harvard.edu">Center for Research on Computation and Soceity</a>.</small>
@@ -137,9 +124,9 @@ <h4 id="crcs-2007-04-18">Web (2.0) Security</h4> [
<br />
<h4 id="bls-2007-04-03">Secrets</h4> [
-<a href="bls-2007-04-03.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/bls-2007-04-03.pdf">PDF</a>
|
-<a href="bls-2007-04-03.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/bls-2007-04-03.mov">Quicktime</a>
]
<br />
<small><em>April 3rd, 2007</em> &mdash; an introduction to Cryptography given at the <a href="http://bls.org">Boston Latin School</a>.</small>
@@ -147,11 +134,11 @@ <h4 id="bls-2007-04-03">Secrets</h4> [
<br />
<h4>Beyond the Paper Trail</h4> [
-<a href="ieee-social-implications-2007-02-27.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/ieee-social-implications-2007-02-27.pdf">PDF</a>
|
-<a href="ieee-social-implications-2007-02-27.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/ieee-social-implications-2007-02-27.mov">Quicktime</a>
|
-<a href="ieee-social-implications-2007-02-27.html">Flash</a>
+<a href="http://content.adida.net/presentations/ieee-social-implications-2007-02-27.html">Flash</a>
]
<br />
<small><em>February 27th, 2007</em> &mdash; a talk at a meeting of the IEEE Society on Social Implications of Technology.</small>
@@ -159,11 +146,11 @@ <h4 id="bls-2007-04-03">Secrets</h4> [
<br />
<h4>How to Shuffle in Public</h4> [
-<a href="tcc-2007-02-24.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/tcc-2007-02-24.pdf">PDF</a>
|
-<a href="tcc-2007-02-24.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/tcc-2007-02-24.mov">Quicktime</a>
|
-<a href="tcc-2007-02-24.html">Flash</a>
+<a href="http://content.adida.net/presentations/tcc-2007-02-24.html">Flash</a>
]
<br />
<small><em>February 24th, 2007</em> &mdash; a talk at <a href="http://www.cwi.nl/projects/crypto/tcc07/">TCC 2007</a>.</small>
@@ -173,9 +160,9 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Public Mixing for Open-Audit Elections</h4> [
-<a href="stanford-2006-11-21.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/stanford-2006-11-21.pdf">PDF</a>
|
-<a href="stanford-2006-11-21.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/stanford-2006-11-21.mov">Quicktime</a>
]
<br />
<small><em>November 21st, 2006</em> &mdash; a talk at <a href="http://cs.stanford.edu.edu">Stanford</a>.</small>
@@ -183,9 +170,9 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Public Mixing for Open-Audit Elections</h4> [
-<a href="berkeley-2006-11-17.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/berkeley-2006-11-17.pdf">PDF</a>
|
-<a href="berkeley-2006-11-17.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/berkeley-2006-11-17.mov">Quicktime</a>
]
<br />
<small><em>November 17th, 2006</em> &mdash; a talk at <a href="http://wellesley.edu">UC Berkeley</a>.</small>
@@ -193,9 +180,9 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Open-Audit Elections</h4> [
-<a href="google-2006-11-16.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/google-2006-11-16.pdf">PDF</a>
|
-<a href="google-2006-11-16.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/google-2006-11-16.mov">Quicktime</a>
]
<br />
<small><em>November 16th, 2006</em> &mdash; a <a href="http://google.com">Google engEdu Talk</a>.</small>
@@ -203,9 +190,9 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Open-Audit Elections</h4> [
-<a href="sri-2006-11-14.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/sri-2006-11-14.pdf">PDF</a>
|
-<a href="sri-2006-11-14.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/sri-2006-11-14.mov">Quicktime</a>
]
<br />
<small><em>November 14th, 2006</em> &mdash; a talk at <a href="http://sri.com">SRI International</a>.</small>
@@ -213,7 +200,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Transparent Elections</h4> [
-<a href="wellesley-2006-11-02.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/wellesley-2006-11-02.pdf">PDF</a>
]
<br />
<small><em>November 2nd, 2006</em> &mdash; a guest lecture at <a href="http://wellesley.edu">Wellesley College</a>.</small>
@@ -221,7 +208,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Scratch &amp; Vote: Self-Contained Paper-Based Cryptographic Voting</h4> [
-<a href="scratch-and-vote-wpes-2006-10-30.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/scratch-and-vote-wpes-2006-10-30.pdf">PDF</a>
]
<br />
<small><em>October 30th, 2006</em> &mdash; a presentation at <a href="http://freehaven.net/wpes2006/">the 2006 Workshop on Privacy in the Electronic Society (WPES)</a>.</small>
@@ -229,7 +216,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Secure Voting Protocols</h4> [
-<a href="mit-tds-voting-2006-09-29.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/mit-tds-voting-2006-09-29.pdf">PDF</a>
]
<br />
<small><em>September 29th, 2006</em> &mdash; a seminar talk for MIT's <a href="http://theory.lcs.mit.edu/tds/">Distributed Systems Group</a>.</small>
@@ -237,7 +224,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>A Brief History of Secure Voting</h4> [
-<a href="voting-review-crcs-2006-09-27.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/voting-review-crcs-2006-09-27.pdf">PDF</a>
]
<br />
<small><em>September 27th, 2006</em> &mdash; a <a href="http://crcs.deas.harvard.edu">Harvard CRCS</a> luncheon talk.</small>
@@ -245,8 +232,8 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Privacy in an Always-Online World</h4> [
-<a href="privacy-simplicity2006.pdf">PDF</a> |
-<a href="privacy-simplicity2006.mov">Quicktime (slides only)</a> |
+<a href="http://content.adida.net/presentations/privacy-simplicity2006.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/privacy-simplicity2006.mov">Quicktime (slides only)</a> |
Video (coming soon)
]
<br />
@@ -255,8 +242,8 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Verifying a Secret-Ballot Election with Cryptography</h4> [
-<a href="phd-thesis-defense.pdf">PDF</a> |
-<a href="phd-thesis-defense.mov">Quicktime (slides only)</a> |
+<a href="http://content.adida.net/presentations/phd-thesis-defense.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/phd-thesis-defense.mov">Quicktime (slides only)</a> |
Video (coming soon)
]
<br />
@@ -265,8 +252,8 @@ <h3 class="highlight">2006</h3>
<br />
<h4>RDFa: Bridging the Hypertext and Semantic Webs</h4> [
-<a href="www2006-rdfa-w3c-track.pdf">PDF</a> |
-<a href="www2006-rdfa-w3c-track.key.tgz">TAR GZIP'ed Keynote</a>
+<a href="http://content.adida.net/presentations/www2006-rdfa-w3c-track.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/www2006-rdfa-w3c-track.key.tgz">TAR GZIP'ed Keynote</a>
]
<br />
<small><em>May 26th, 2006</em> &mdash; a W3C Track talk at <a href="http://www2006.org">WWW2006</a>.</small>
@@ -274,8 +261,8 @@ <h3 class="highlight">2006</h3>
<br />
<h4>RDFa: Interoperable Web Metadata</h4> [
-<a href="www2006-rdfa-dev-track.pdf">PDF</a> |
-<a href="www2006-rdfa-dev-track.key.tgz">TAR GZIP'ed Keynote</a>
+<a href="http://content.adida.net/presentations/www2006-rdfa-dev-track.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/www2006-rdfa-dev-track.key.tgz">TAR GZIP'ed Keynote</a>
]
<br />
<small><em>May 24th, 2006</em> &mdash; a Dev Track talk at <a href="http://www2006.org">WWW2006</a>.</small>
@@ -283,20 +270,20 @@ <h3 class="highlight">2006</h3>
<br />
-<h4>RDFa: Interoperable Web Metadata</h4> [ <a href="may-2006-rdfa-lightning-talk/">HTML</a> ]
+<h4>RDFa: Interoperable Web Metadata</h4> [ <a href="http://content.adida.net/presentations/may-2006-rdfa-lightning-talk/">HTML</a> ]
<br />
<small><em>May 21st, 2006</em> &mdash; a lightning talk at the W3C Advisory Committee Meeting.</small>
<br />
<br />
-<h4>Web Security</h4> [ <a href="6171-spring2006-web-security.pdf">PDF</a> ]
+<h4>Web Security</h4> [ <a href="http://content.adida.net/presentations/6171-spring2006-web-security.pdf">PDF</a> ]
<br />
<small><em>May 9th, 2006</em> &mdash; a lecture in MIT's <a href="http://philip.greenspun.com/teaching/6171/2006-spring/">6.171 &mdash; Software Engineering for Internet Applications</a></small>
<br />
<br />
<h4>Cryptography II &mdash; Some Applications</h4> [
-<a href="6976-spring06-crypto2.pdf">PDF</a> | <a href="6976-spring06-crypto2.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/6976-spring06-crypto2.pdf">PDF</a> | <a href="http://content.adida.net/presentations/6976-spring06-crypto2.mov">Quicktime</a>
]
<br />
<small><em>May 3rd, 2006</em> &mdash; a lecture in MIT's <a href="http://mit.edu/6.976/www">6.976 &mdash; Quantitative Foundations of Engineering Systems</a>.</small>
@@ -304,7 +291,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Cryptography I &mdash; Basics</h4> [
-<a href="6976-spring06-crypto1.pdf">PDF</a> | <a href="6976-spring06-crypto1.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/6976-spring06-crypto1.pdf">PDF</a> | <a href="http://content.adida.net/presentations/6976-spring06-crypto1.mov">Quicktime</a>
]
<br />
<small><em>May 1st, 2006</em> &mdash; a lecture in MIT's <a href="http://mit.edu/6.976/www">6.976 &mdash; Quantitative Foundations of Engineering Systems</a>.</small>
@@ -312,7 +299,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Direct Verification of Elections with Cryptography</h4> [
-<a href="umass-voting-2006-04-10.pdf">PDF</a> | <a href="http://rerun.cs.umass.edu/web/fall05/ia/adida.ram">Real (Video+Slides)</a>
+<a href="http://content.adida.net/presentations/umass-voting-2006-04-10.pdf">PDF</a> | <a href="http://rerun.cs.umass.edu/web/fall05/ia/adida.ram">Real (Video+Slides)</a>
]
<br />
<small><em>April 10th, 2006</em> &mdash; a lecture in UMass Amherst's <a href="http://prisms.cs.umass.edu/cs591d/">CS591d &mdash; Applied Cryptography</a>.</small>
@@ -320,7 +307,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Building Interoperable Web Metadata</h4> [
-<a href="w3c-2006-04-06/w3c-2006-04-06.pdf">PDF</a> | <a href="w3c-2006-04-06/html/w3c">HTML</a>
+<a href="http://content.adida.net/presentations/w3c-2006-04-06/w3c-2006-04-06.pdf">PDF</a> | <a href="http://content.adida.net/presentations/w3c-2006-04-06/html/w3c">HTML</a>
]
<br />
<small><em>April 6th, 2006</em> &mdash; a W3C Project Review.</small>
@@ -328,7 +315,7 @@ <h3 class="highlight">2006</h3>
<br />
<h4>Building Interoperable Metadata</h4> [
-<a href="semantic-2006-03-08.pdf">PDF</a>
+<a href="http://content.adida.net/presentations/semantic-2006-03-08.pdf">PDF</a>
]
<br />
<small><em>March 8th, 2006</em> &mdash; a presentation at the <a href="http://semantic-technology.com">Semantic Technology Conference</a>.</small>
@@ -337,8 +324,8 @@ <h3 class="highlight">2006</h3>
<h3 class="highlight">2005</h3>
<br />
<h4>Lightweight Signatures for Email (A Defense against Phishing)</h4> [
-<a href="6857-lecture-2005-12-07.pdf">PDF</a> |
-<a href="6857-lecture-2005-12-07.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/6857-lecture-2005-12-07.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/6857-lecture-2005-12-07.mov">Quicktime</a>
]
<br />
<small><em>December 7th, 2005</em> &mdash; a lecture in MIT's <a href="http://stellar.mit.edu/S/course/6/fa05/6.857/">6.857 &mdash; Network and Computer Security</a> course.</small>
@@ -346,9 +333,9 @@ <h3 class="highlight">2005</h3>
<br />
<h4>Fighting Phishing Attacks &mdash; Lightweight Signatures for Email</h4> [
-<a href="crcs-2005-11-02.pdf">PDF</a> |
-<a href="crcs-2005-11-02.mov">Quicktime</a> |
-<a href="crcs-2005-11-02.ppt">Powerpoint</a>
+<a href="http://content.adida.net/presentations/crcs-2005-11-02.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/crcs-2005-11-02.mov">Quicktime</a> |
+<a href="http://content.adida.net/presentations/crcs-2005-11-02.ppt">Powerpoint</a>
]
<br />
<small><em>November 2nd, 2005</em> &mdash; at Harvard's <a href="http://crcs.deas.harvard.edu">Center for Research on Computation and Society</a>.</small>
@@ -356,8 +343,8 @@ <h3 class="highlight">2005</h3>
<br />
<h4>Lightweight Encryption for Email</h4> [
-<a href="sruti-2005-07-07.pdf">PDF</a> |
-<a href="sruti-2005-07-07.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/sruti-2005-07-07.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/sruti-2005-07-07.mov">Quicktime</a>
]
<br />
<small><em>July 7th, 2005</em> &mdash; <a href="http://www.usenix.org/events/sruti05/">Steps to Reducing Unwanted Traffic on the Internet (SRUTI) 2005</a>, Cambridge, Massachusetts.</small>
@@ -365,8 +352,8 @@ <h3 class="highlight">2005</h3>
<br />
<h4>Lightweight Signatures for Email</h4> [
-<a href="dig-presentation-2005-06-30.pdf">PDF</a> |
-<a href="dig-presentation-2005-06-30.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/dig-presentation-2005-06-30.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/dig-presentation-2005-06-30.mov">Quicktime</a>
]
<br />
<small><em>June 30th, 2005</em> &mdash; <a href="http://groups.csail.mit.edu/dig/">Decentralized Information Group</a> Meeting, MIT</small>
@@ -374,8 +361,8 @@ <h3 class="highlight">2005</h3>
<br />
<h4>Lightweight Signatures for Email</h4> [
-<a href="cis-seminar-2005-05-06.pdf">PDF</a> |
-<a href="cis-seminar-2005-05-06.mov">Quicktime</a>
+<a href="http://content.adida.net/presentations/cis-seminar-2005-05-06.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/cis-seminar-2005-05-06.mov">Quicktime</a>
]
<br />
<small><em>May 5th, 2005</em> &mdash; Cryptography and Information Security Seminar, MIT</small>
@@ -383,25 +370,25 @@ <h3 class="highlight">2005</h3>
<br />
<h4>Cryptographic Voting Tutorial</h4> [
-<a href="crypto-voting-tutorial-2005-02-12.pdf">PDF</a> |
-<a href="crypto-voting-tutorial-2005-02-12.mov">Quicktime</a> ]
+<a href="http://content.adida.net/presentations/crypto-voting-tutorial-2005-02-12.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/crypto-voting-tutorial-2005-02-12.mov">Quicktime</a> ]
<br />
<small><em>February 12th, 2005</em> &mdash; Radcliffe Institute for Advanced Study, Harvard University</small>
<br />
<br />
<h4>Introducing VSPR</h4> [
-<a href="vspr-2005-02-12.pdf">PDF</a> |
-<a href="vspr-2005-02-12.mov">Quicktime</a> ]
+<a href="http://content.adida.net/presentations/vspr-2005-02-12.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/vspr-2005-02-12.mov">Quicktime</a> ]
<br />
<small><em>February 12th, 2005</em> &mdash; Radcliffe Institute for Advanced Study, Harvard University</small>
<br />
<br />
<h4>Robust Mixnets in Electronic Voting</h4> [
-<a href="cambridge-university-voting-2005-01-18.pdf">PDF</a> |
-<a href="cambridge-university-voting-2005-01-18.mov">Quicktime</a> |
-<a href="cambridge-university-voting-2005-01-18.ppt">Powerpoint</a> ]
+<a href="http://content.adida.net/presentations/cambridge-university-voting-2005-01-18.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/cambridge-university-voting-2005-01-18.mov">Quicktime</a> |
+<a href="http://content.adida.net/presentations/cambridge-university-voting-2005-01-18.ppt">Powerpoint</a> ]
<br />
<small><em>January 18th, 2005</em> &mdash; Cambridge University, Cambridge, England</small>
<br />
@@ -410,19 +397,19 @@ <h3 class="highlight">2004</h3>
<br />
<h4>Trusting the Vote</h4> [
-<a href="is2k4-panel-2004-12-10.pdf">PDF</a> |
-<a href="is2k4-panel-2004-12-10.mov">Quicktime</a> |
-<a href="is2k4-panel-2004-12-10.ppt">Powerpoint</a> ]
+<a href="http://content.adida.net/presentations/is2k4-panel-2004-12-10.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/is2k4-panel-2004-12-10.mov">Quicktime</a> |
+<a href="http://content.adida.net/presentations/is2k4-panel-2004-12-10.ppt">Powerpoint</a> ]
<br />
<small><em>December 10th, 2004</em> &mdash; Harvard Law School Internet &amp; Society Conference</small>
<br />
<br />
<h4>Secure and Fair Elections</h4> [
-<a href="harvard-digdem-2004-11-02.pdf">PDF</a> |
-<a href="harvard-digdem-2004-11-02.mov">Quicktime</a> |
-<a href="harvard-digdem-2004-11-02.ppt">Powerpoint</a> |
-<a href="harvard-digdem-2004-11-02.key.tgz">Gzipped Keynote</a> ]
+<a href="http://content.adida.net/presentations/harvard-digdem-2004-11-02.pdf">PDF</a> |
+<a href="http://content.adida.net/presentations/harvard-digdem-2004-11-02.mov">Quicktime</a> |
+<a href="http://content.adida.net/presentations/harvard-digdem-2004-11-02.ppt">Powerpoint</a> |
+<a href="http://content.adida.net/presentations/harvard-digdem-2004-11-02.key.tgz">Gzipped Keynote</a> ]
<br />
<small><em>November 2nd, 2004</em> &mdash; Harvard Law School, Digital Democracy</small>
<br />
View
17 style.css
@@ -30,4 +30,19 @@ h1 {
#main {
padding-top: 0px;
text-align: left;
-}
+}
+
+h3.highlight {
+ font-size: 18pt;
+ background: #ddd;
+ margin-bottom: 1px;
+ margin-top: 25px;
+ padding: 5px;
+ border-bottom: 1px solid #888;
+}
+
+h4 {
+ line-height: 100%;
+ margin: 1px;
+ display: inline;
+}
Please sign in to comment.
Something went wrong with that request. Please try again.