Oral History Interview with Dr. Paul van Oorschot
Loading...
View/Download File
Persistent link to this item
Statistics
View StatisticsJournal Title
Journal ISSN
Volume Title
Title
Oral History Interview with Dr. Paul van Oorschot
Alternative title
Published Date
2024-06-12
Publisher
Charles Babbage Institute
Type
Oral history interview
Oral History
Oral History
Abstract
This oral history interview is sponsored by and a part of NSF 2202484 “Mining a Useable Past: Perspectives, Paradoxes, and Possibilities with Security and Privacy,” at the Charles Babbage Institute. The interview is with computer security and cryptography pioneer Paul van Oorschot. He begins by recounting his time in high school, and how he obtained both his undergraduate and graduate degrees at the University of Waterloo, where he played on the basketball team. He tells of Wes Graham' influence and how working within the University of Waterloo's Computer Systems Group led him to develop interests in computer science which grew out of his longtime interest in mathematics. He began working at Bell-Northern Research (BNR) and discusses his research there. He transitioned into academe and a Professorship in Computer Science in 2002 with the Canada Research Chairs Program at Carleton University. He discusses public key infrastructure in industry and research in this area during the 1990s, and also how he and his students got into graphical password schemes. He shares briefly about his 20 patents, mostly in certificates and certificate management. He relates what the “crypto wars” were like from a political economy context in Canada. He moves on to offer context to the textbooks he has written. He relates his philosophy in teaching undergraduate and graduate students. And he also touches upon cryptocurrency from technical and societal perspective. Finally, he reflects on the implications of artificial intelligence, as well as on solving problems of interest to society and professional incentives.
Description
Related to
Replaces
License
Collections
Series/Report Number
NSF 2202484 “Mining a Useable Past: Perspectives, Paradoxes, and Possibilities with Security and Privacy”; 2
Funding information
NSF
Isbn identifier
Doi identifier
Previously Published Citation
Other identifiers
Suggested citation
Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.