http://www.kustar.ac.ae/risc10/
Sunday, January 16, 2011
RISC 2010, 9-10 November, London, UK
http://www.kustar.ac.ae/risc10/
Thursday, July 08, 2010
Korea Industrial and Scientific Tour: June 7-17, 2010
Prof. Khaled and I took 20 male students for Korea Industiral Scientific Tour from the 7th of June to the 17th of June 2010.
We have invisted several places as follows:
1. Meeting with the UAE Ambassador in Korea
2. LG Electornics and Samsung Electornics
1. Meeting with the UAE Ambassador in Korea
2. LG Electornics and Samsung Electornics
3. Meeting with KAIST Professors and Provost
4. Kori Nuclear Power Station and Satrec I
5. Pusan and Gyeongju
6. Palaces and KT Wibro
Newspapers:
Monday, January 18, 2010
UAE(KUSTAR)-Korea(KAIST) Multi-Lateral Education Agreement, 14 January 2010

1. Agreement linked to the $20.4 billion nuclear power contract signed between the UAE and a South Korean consortium
2. Deal establishes partnerships in Research, Education and Vocational Training
http://news.chosun.com/site/data/html_dir/2010/01/15/2010011500078.html
http://article.joins.com/article/article.asp?total_id=3968415
http://www.kustar.ac.ae/main/index.php?page=kaist-sign-agreement
Kindly find below links to the TV coverage that we received on the above event in Abu Dhabi TV & Abu Dhabi Al Emarat TV (Arabic Only):
http://www.mediawatchme.com/pages/client/item/viewer.aspx?ID=f65fe88b-8119-4942-a1cd-3d0ef0548de2
http://www.mediawatchme.com/pages/client/item/viewer.aspx?ID=560b8a1a-0253-4493-b298-9026e2d8629b
http://www.mediawatchme.com/pages/client/item/viewer.aspx?ID=32f96a70-0085-4d24-be1e-f628ca233d10
Tuesday, November 03, 2009
New Appointment: Advisor of the AECF

http://asianecf.oranc.co.kr/aecf_data/20091102.pdf
http://www.asianecf.org/
Thursday, October 01, 2009
Being a new mebmer for International Who's Who Professionals 2009

International WHO'S WHO Historical Society is one of the largest membership organizations worldwide.
I have been recently invited as a new member of International Who's Who Professional 2009 as follows:
http://www.internationalwhoswho.com/newMembers.aspx?showtable=true
http://www.internationalwhoswho.com/bio.aspx?id=5681070
Friday, June 26, 2009
The 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09)

This workshop brings together active research and development people working in the field of security and privacy to study specific issues and challenges of RFID systems. Therefore, the objective is to promote exchanges between different communities as regards security and privacy of the RFID systems. One of the aims is also to assess the expectations of security, privacy and applications related to the RFID discipline. This one day workshop will concentrate on the basic theory, technology, applications and practical experience in a variety of issues of confidentiality and security of RFID systems.
The RISC09 Programme is now available as follows:
Wednesday, June 17, 2009
National Security Submit Middle East 2009, Abu Dhabi, 21 June 2009

I organised the Workshop program for National Security Submit Middle East on the 21st of June 2009:
Venue: Hilton, Abu Dhabi, UAE
Workshop Chair: Dr. Chan Yeob Yeun (Khalifa University)
8:30 - 9:00: Registrations
9:00 - 9:45: Emerging Ubiquitous Cyber Security by Dr. Chan Yeob Yeun (Khalifa University)
9:45 - 10:15: Communications Security and Threats by Dr. Arafat Al-Dweik (Kahlifa University)10:15 - 10:45: Coffee and Tea
10:45 - 11:15: e-ID Verificaiton & Should you trust a digital signature? by Mr. Liaquat Khan (Ascertia)
11:15 - 12:00: Panel Discussions on Cyber Security and Countermeasures.
Thursday, March 26, 2009
RAIS 2009, April 27, 2009 at University of Sharjah


https://www.sharjah.ac.ae/English/Academics/Colleges/Engineering/Departments/Elecomeng/Research/ResearchGroups/ComputerInternetSecurity/Pages/Program.aspx
Friday, March 20, 2009
THE FIRST GCC ISG ALUMNI CONFERENCE, 24 March 2009


This event was sponsored by Khalifa University. A keynote address was presented by Prof. Fred Piper, Royal Holloway, University of London as a guest of honor.
The provisional Alumni conference program is as follows:
08:30-09:00: Free Registration
09:00-09:05: Prof. Fred Piper: Opening remarks
09:05-09:30: Dr. Ali Al-Qayedi, Manager, KUSTAR, Sharjah Campus: Welcome, KUSTAR InfoSec Overview
09:30-10:30: Keynote speaker: Prof. Fred Piper, RH, University of London: The Application of Cryptography
10:30-11:00: Tea / Coffee Break
11:00-11:30: Dr. Chan Yeob Yeun, KUSTAR, UAE: Ubiquitous Network Security
11:30-12:00: Mr. Liaquat Khan, Director of Ascertia, UAE: Advanced Digital Signatures for PDF Documents
12:00-12:30: Dr. Fauzan Mirza, National University of Science and Technology, Pakistan: Digital Forensics
12:30-13:00: Mr. A. Rahiman, Manager of eDocuMan: Digital signatures for long-term preservating/archiving
13:00-13:05: Closing remarks
13:05-14:00: Networking Lunch
This was the first GCC Region ISG Alumni Conference for getting in touch with all Alumni members and Information Security Professionals in the GCC region.
Please contact Dr. Chan Yeob Yeun, conference organisor for any enquires regarding this event.
Sunday, January 18, 2009
Cyber Defence Summit, 15-17 March 2009, Dubai, UAE

To present my talk at the Cyber Defence Summit that will be held in the Sheraton Creek Hotel in Dubai, UAE from the 15th to the 17th March 2009:
http://www.cyberdefenceme.com/
http://www.cyberdefenceme.com/
Sunday, January 04, 2009
RFID Security 2009 Asia, January 9th, 2009, Taipei Taiwan

I gave an invited talk "Emerging Ubiquitous Network Security by using RFID Technology" at RFID Security 2009 Workshop on the 9th of January 2009 in Taipei, Taiwan:
http://rfidsec2009asia.servehttp.com/index.html
Venue: RFID Education and Research Center of National Taiwan University of Science and Technology
Date: 9 January 2009
http://rfidsec2009asia.servehttp.com/index.html
Venue: RFID Education and Research Center of National Taiwan University of Science and Technology
Date: 9 January 2009
Monday, November 03, 2008
Middle East IT Security Conferece, 16-20 November 2008, Dubai, UAE
Tuesday, September 02, 2008
Lecturing Internet Security and Computer Network II at Khalifa University in September 2008
Sunday, July 20, 2008
The First Information Security Alumni Reunion Conference, 21-23 July 2008, University of London


I attended the first Information Security Alumni Reunion Conference on 21st-23nd July 2008 at Royal Holloway, University of London.
I gave a talk on Ubiquitous Network Security - Evolution, Opportunities, Security Challenges and Future Directions at the conference on the 22nd of July at 12:00-12:30:
Please visit this web site for the lastest version of the programme at the conference:
Sunday, July 06, 2008
Ubiquitous Network Security Course at NTUST for the Summer Term 2008

I was recently invited by the National Taiwan University of Science and Technology (NTUST) as a Visiting Professor for this summer term and lectured "Ubiquitous Network Security" at the Department of Information Management, NTUST in Taipei, Taiwan:
http://www.cs.ntust.edu.tw/global/
Venue: NTUST, Taiwan
Credit/Hours: 3/6
Lecturing Hour: Mon./Wed., 13:30-16:30, Summer Term, July-August 2008
http://www.cs.ntust.edu.tw/global/
Venue: NTUST, Taiwan
Credit/Hours: 3/6
Lecturing Hour: Mon./Wed., 13:30-16:30, Summer Term, July-August 2008
Thursday, April 24, 2008
ITU Telecom Africa 2008, Cairo, 12-15 May
Thursday 15 May - Africa in the Vanguard (PL4-1)
Title: Creating trusted environments
Panel discussion: New threats have emerged that impact user confidence in the use of ICTs. Developing countries, with limited human, institutional and financial resources, face particular challenges in elaborating and implementing national frameworks for cybersecurity.
Room: Chefren A&B
Time: 9:00-11:00
I paticipated in a pannel disscussion entitled "Creating trusted environments" as an invited panelist:
http://www.itu.int/cgi-bin/htsh/TELECOM/scripts/forum/fp?event=aft2008&_sessionid=895&_languageid=1
I also presented my talk entitled "Emerging digital convergence with T-DMB services" in the sub-session at the Korean Pavilion:
http://www.itu.int/TELECOM/scripts/e-manual/images/00001815.pdf
Date and Time: 12-14 May, 14:00-14:20
Title: Creating trusted environments
Panel discussion: New threats have emerged that impact user confidence in the use of ICTs. Developing countries, with limited human, institutional and financial resources, face particular challenges in elaborating and implementing national frameworks for cybersecurity.
Room: Chefren A&B
Time: 9:00-11:00
I paticipated in a pannel disscussion entitled "Creating trusted environments" as an invited panelist:
http://www.itu.int/cgi-bin/htsh/TELECOM/scripts/forum/fp?event=aft2008&_sessionid=895&_languageid=1
I also presented my talk entitled "Emerging digital convergence with T-DMB services" in the sub-session at the Korean Pavilion:
http://www.itu.int/TELECOM/scripts/e-manual/images/00001815.pdf
Date and Time: 12-14 May, 14:00-14:20
Tuesday, April 22, 2008
Short Cyber Course to Sultan Qaboos University, April 28-29, 2008

Short Course Title: Ubiquitous Network Security
Speaker: Dr. Chan Yeob Yeun
Time and Date: 13:00-15:45, April 28-29, 2008
Method of Lecture: Cyber Lectures to postgraduate students and faculty staff at Sultan Qaboos University in Oman:
http://www.squ.edu.om/
Short Course Description:
This short course offers how to evaluate a variety of vulnerabilities over the existing network and how to construct security protocols and their applications by using crypto algorithms, digital signature and hash function to guarantee integrity of information and authentication of network entities including WLAN security, Mobile Security, WPAN Security and Ubiquitous Security. Moreover, every audience can get the knowledge how to build a typical network security protocols like Kerberos, SSL, TLS and IPSec and network security mechanism like Firewall and IDS:
http://news.chosun.com/site/data/html_dir/2008/05/01/2008050100475.html
http://www.etnews.co.kr/news/detail.html?id=200804300190
Speaker: Dr. Chan Yeob Yeun
Time and Date: 13:00-15:45, April 28-29, 2008
Method of Lecture: Cyber Lectures to postgraduate students and faculty staff at Sultan Qaboos University in Oman:
http://www.squ.edu.om/
Short Course Description:
This short course offers how to evaluate a variety of vulnerabilities over the existing network and how to construct security protocols and their applications by using crypto algorithms, digital signature and hash function to guarantee integrity of information and authentication of network entities including WLAN security, Mobile Security, WPAN Security and Ubiquitous Security. Moreover, every audience can get the knowledge how to build a typical network security protocols like Kerberos, SSL, TLS and IPSec and network security mechanism like Firewall and IDS:
http://news.chosun.com/site/data/html_dir/2008/05/01/2008050100475.html
http://www.etnews.co.kr/news/detail.html?id=200804300190
Date & Time: 28 April 2008, 13:00-15:45 Class hour (Each 1.15 hour)
Lecture 1, 13:00-14:15: Introduction to Ubiquitous Network Security (Overview of this class, Definitions and Terminologies)
Lecture 2, 14:30-15:45: Modern Cryptography (History, Symmetric, Asymmetric Cryptography, Security Protocols)
Date & Time: 29 April 2008, 13:00-15:45
Lecture 3, 13:00-14:15: Applications of UNS (Mobile Security, WLAN Security, WPAN Security) Lecture 4, 14:30-15:45: Applications of UNS and Summary (RFID Security, M-Commerce Security, SSL/TLS, IPSec, Firewall, IDS)
Friday, November 16, 2007
Invited Tutorial and speech at ITI 2007 International Conference, 16-18 December, Cairo, Egypt



I recently gave an invited tutorial and invited conference speech on Mobile TV Technologies that includes DMB, DVB-H, MediaFLO, 3G, Biz Models and Future Directions at ITI 5th International Conference on Information & Communicaitons Technology, Cairo, Egypt, 16-18 December, 2007.
Tutorials and Agenda:
http://www.icict.gov.eg/ICICT2007/Tutorials.html
http://www.icict.gov.eg/ICICT2007/agenda2.htmlhttp://www.icict.gov.eg/ICICT2007/Tutorials.html
Venue: Cairo Marriotte Hotel, Egypt
Date: 16-18 Decebmer, 2007
Date: 16-18 Decebmer, 2007
Thursday, November 01, 2007
Keynote Speech at IWAP 2007 Conference, Perth, Australia

I was invited for a keynote speaker at the Sixth International Workshop for Applied PKC, Perth, Western Australia, 3-4 December, 2007.
http://conferences.scis.ecu.edu.au/IWAP2007/speakers.php
Date: 3-4 December, 2007
Venue: Perth, Australia, Mount Lawley Campus of Edith Cowan University
Keynote Speech: Mobile Security and Ubiquitous Network Security.
http://conferences.scis.ecu.edu.au/IWAP2007/speakers.php
Date: 3-4 December, 2007
Venue: Perth, Australia, Mount Lawley Campus of Edith Cowan University
Keynote Speech: Mobile Security and Ubiquitous Network Security.
Monday, September 03, 2007
Lecturing Network Security (ICE0615) at ICU

http://caislab.icu.ac.kr/Lecture/data/2007/fall/ice615/
2. Course Number: ICE615
3. Professor: Chan Yeob Yeun
4. *Lec:Exp:Cre: 3:0:3
5. Lecture Times: Mon/Wed (14:30 ~ 16:00)
6. Lecture Room: L403
7. Contact:
Tel: +82-42-866-6192
E-mail: cyeun @ i c u . a c . k r
This course offers how to evaluate a variety of vulnerabilities over the existing network and how to construct security protocols and their applications by using crypto algorithms, digital signature and hash function to guarantee integrity of information and authentication of network entities including WLAN security, Mobile Security, WPAN Security and Ubiquitous Security. Moreover, everystudent can get the knowledge how to bulida typical network security protocols like Kerberos, SSL, TLS and IPSEC and network security mechanism like Firewall and IDS.
2. Course Number: ICE615
3. Professor: Chan Yeob Yeun
4. *Lec:Exp:Cre: 3:0:3
5. Lecture Times: Mon/Wed (14:30 ~ 16:00)
6. Lecture Room: L403
7. Contact:
Tel: +82-42-866-6192
E-mail: cyeun @ i c u . a c . k r
This course offers how to evaluate a variety of vulnerabilities over the existing network and how to construct security protocols and their applications by using crypto algorithms, digital signature and hash function to guarantee integrity of information and authentication of network entities including WLAN security, Mobile Security, WPAN Security and Ubiquitous Security. Moreover, everystudent can get the knowledge how to bulida typical network security protocols like Kerberos, SSL, TLS and IPSEC and network security mechanism like Firewall and IDS.
Subscribe to:
Posts (Atom)