Ph.D. School of Computing, Queen s University 09/ /2010 Computer Science Thesis: Applications of Quantum Cryptography.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Ph.D. School of Computing, Queen s University 09/ /2010 Computer Science Thesis: Applications of Quantum Cryptography."

Transcription

1 Naya Nagy Assistant Professor College of Computer Engineering and Science Prince Mohammad University Kingdom of Saudi Arabia Office: F102 Academic background Ph.D. School of Computing, Queen s University 09/ /2010 Computer Science Thesis: Applications of Quantum Cryptography. M.Sc. School of Computing, Queen s University 09/ /2001 Computer Science Thesis: The Maximum Flow Problem: A Real-Time Approach. B.Sc. Faculty of Automation and Computer Science 09/ /1993 Computer Science Technical University of Cluj-Napoca, Romania Diploma project: Execution tree for a PARLOG interpreter. Awards Location Award of tenure Period NSERC - PGS D3 Scholarship (national) (1) 09/ /2008 Ontario Graduate Scholarship (1) 09/ /2006 Science and Technology (provincial) Queen s Graduate Fellowship (university) (1) 09/ /2000

2 Editor - Editor for the journal Parallel Processing Letters present.. - I was a co-organizer of the Workshop on Unconventional Computational Problems, held on August 13, 2007 in Kingston, Ontario, Canada, as part of the Sixth International Conference on Unconventional Computation (UC 07). In this quality, I am an editor of the Proceedings of the workshop. Supervisor - Eman Al Sukairi and Nada Daghistani and Sara Al Bassam: 4th year undergraduate project Group Comparison of Bacterial Genomes (2013) - Hafsa Yazdani and Fatemah Al Zayer: 4th year undergraduate project Turing Machine Simulator (2012) - Maryam Al Dhamen and Yasmeen Abussaud: 4th year undergraduate project Quantum Game Company with Marketing Research (2011) - Jameel Mawji: 4th year undergraduate project Solving a maze using DNA computing (2008) - Cameron McKay: scientific consultant for MSc thesis Molecular codebreaking and double encoding - laboratory experiments ( ) Publications (a) Journal articles Hafsa Yazdani, Fatemah Al Zayer, Naya Nagy and Marius Nagy (2014) Turing Machine Simulations: Classic and Quantum. International Journal of Computer and Electrical Engineering. 6(1): Marius Nagy and Naya Nagy (2012) Quantum Tic-Tac-Toe: A Genuine Probabilistic Approach. Applied Mathematics (Special Issue Computing). 3(11A): Nagy, N. and Akl, S.G., Computing with uncertainty and its implications to universality, International Journal of Parallel, Emergent and Distributed Systems, Vol. 27, Issue 2, April 2012, pp Naya Nagy, Marius Nagy and Selim G. Akl. Hypercomputation in a cryptographic setting: Solving the identity theft problem using quantum memories. International Journal of Unconventional Computing, Vol. 6, No. 5, 2010, pp Nagy, N., Nagy, M., and Akl, S.G., Quantum security in wireless sensor networks, Natural Computing, Vol. 9, No. 4, December 2010, pp

3 Nagy, N., Nagy, M. and Akl, S.G., Key distribution versus key enhancement in quantum cryptography, Parallel Processing Letters, Special Issue on Advances in Quantum Computation, Qiu, K., Ed., Vol. 20, No. 3, September 2010, pp Nagy, N. and Akl, S.G., A quantum cryptographic solution to the problem of access control in a hierarchy, Parallel Processing Letters, Special Issue on Advances in Quantum Computation, Qiu, K., Ed., Vol. 20, No. 3, September 2010, pp Nagy, N. and Akl, S.G., One-time pads without prior encounter, Parallel Processing Letters, Special Issue on Advances in Quantum Computation, Qiu, K., Ed., Vol. 20, No. 3, September 2010, pp Cameron McKay, Joslynn Affleck, Naya Nagy, Selim G. Akl and Virginia K. Walker, Molecular codebreaking and double encoding - Laboratory experiments, International Journal of Unconventional Computing, Vol. 5, No. 6, 2009, pp Naya Nagy and Selim G. Akl, Authenticated quantum key distribution without classical communication, Parallel Processing Letters, Special Issue on Unconventional Computational Problems, Vol. 17, No. 3, September 2007, pp Naya Nagy and Selim G. Akl, Aspects of biomolecular computing, Parallel Processing Letters, Vol. 17, No. 2, June 2007, pp Naya Nagy and Selim G. Akl, The maximum flow problem: A real-time approach, Parallel Computing, Vol. 29, No. 6, 2003, pp (b) Conference presentations 1. Marius Nagy and Naya Nagy. Quantum Secret Communication Without an Encryption Key. to apper in the Proceedings of Theory and Practice of Natural Computing (TPNC 13). December Caceres, Spain. 2. Marius Nagy and Naya Nagy. General Quantum Encryption Scheme based on Quantum Memory. to appear in the Proceedings of Theory and Practice of Natural Computing (TPNC 13). December Caceres, Spain. 3. Naya Nagy, Marius Nagy and Paul Hodor. Cryptography and Information Protection in the Living World. Proceedings of the 2012 International Conference on Bioinformatics & Computational Biology (BIOCOMP 2012, part of WORLDCOMP 12). pages July Las Vegas, Nevada. 4. Marius Nagy and Naya Nagy. Quantum Tic-Tac-Toe: A Genuine Probabilistic Approach. Proceedings of the Satellite Workshops of UC June 6 10, 2011, Turku, Finland. in: Mike Stannet et al, Eds., TUCS (Turku Centre for Computer Science) Lecture Notes, No. 14, pages , June Naya Nagy and Selim G. Akl, Computations with uncertain time constraints: Effects on parallelism and universality, Proceedings of the Tenth International Conference on Unconventinal Computation, Lecture Notes in Computer Science 6714, Turku, Finland, June 2011, pp Naya Nagy and Selim G. Akl, Access control in a hierarchy by quantum means, Proceedings of the Third International Workshop on Physics and Computation, Luxor, Egypt, August - September 2010, pp

4 7. Naya Nagy and Selim G. Akl, Time-sensitive computational models with a dynamic time component, Proceedings of the Workshop on Physics and Computation, Held as a part of the Eighth International Conference on Unconventional Computation, Ponta Delgada (Azores), Portugal, September Naya Nagy, Marius Nagy and Selim G. Akl. Hypercomputation in a cryptographic setting: Solving the identity theft problem using quantum memories. HyperNet09: The UC2009 Hypercomputation Workshop. Held as a part of the Eighth International Conference on Unconventional Computation, Ponta Delgada (Azores), Portugal, September Naya Nagy, Marius Nagy and Selim G. Akl. Quantum wireless sensor networks. Proceedings of the Seventh International Conference on Unconventional Computation. Vienna, Austria, August in: Calude C.S., et al, Eds., Lecture Notes in Computer Science Springer-Verlag, Berlin, pages Naya Nagy and Selim G. Akl, Quantum authenticated key distribution, Proceedings of the Sixth International Conference on Unconventional Computation, Kingston, Canada, August 2007, in: Akl, S.G., et al, Eds., Lecture Notes in Computer Science 4618, Springer-Verlag, Berlin, 2007, pp Naya Nagy, and Selim G. Akl, Authenticated quantum key distribution without classical communication, Proceedings of the Workshop on Unconventional Computational Problems, Sixth International Conference on Unconventional Computation, Kingston, Canada, August 2007, pp Naya Nagy and Selim G. Akl, The maximum flow problem: A real-time approach, Proceedings of the Thirteenth Conference on Parallel and Distributed Computing and Systems, Anaheim, California, August 2001, pp Naya Nagy, Constant Time Algorithms in Maze Routing, in Proceedings of the 14th IASTED International Conference on Parallel and Distributed Computing and Systems, Cambridge, USA, November 4-6, 2002, pp T. Muresan, R. Potolea, N. Hodor, S. Moldovan, M. Nagy, Execution mechanisms in concurrent logic programming, International Conference on Technical Informatics - ConTI, Timisoara, Romania, (c) Technical Reports 1. Naya Nagy, Marius Nagy, and Selim G. Akl, Key distribution versus key enhancement in quantum cryptography, Technical Report , School of Computing, Queen s University, Kingston, Ontario, November 2007, 16 pages. Teaching Experience College of Computer Engineering and Science Prince Mohammad Bin Fahd University Kingdom of Saudi Arabia (2010 present)

5 COSC3313 Human Computer Interaction Human Computer Interaction refers to the design of the interface between a human as a psychological entity and a device as a digital entity. Interaction design concepts are implemented on an Android mobile device. The Android project integrates Java with advanced object oriented concepts and XML files. COSC4461 Programming Languages Programming languages is the study of basic concepts and constructs underlying the design of the modern programming languages. Various programming paradigms, including object-oriented, functional, logic, and concurrent programming, are discussed. ITAP4371 E-Commerce The primary objective of this course is to expose students to the advanced use of information technology in the design and implementation of Web-based business applications to support e-commerce. The course presents concepts, methodology, and tools for designing, implementing, and management of e-commerce applications in a business-to-business paradigm. ITAP1312 Web Programming This course is designed to provide the students with an introduction to World Wide Web programming. It introduces the student to the techniques used in programming web pages for interactive content. It specifically addresses the basic elements of AJAX -Asynchronous JavaScript and XML for enhanced web interaction and applications. GEIT1411 Computer Science I The course presents primary programming concepts: flow of control, branching statements, boolean logic, loops, nested loops, functions, pass by value, pass by reference, arrays, reading from and writing into a file. GEIT1412 Computer Science II The course presents pointers, recursion, and object oriented concepts: classes, objects, constructors, friend functions, inheritance, abstract functions. GEIT1311 Introduction to IT This course introduces students to the basic hardware and software components of the computer. School of Computing, Queen s University Canada ( ) Fall 2005, Fall invited to give four lectures (each year) on biological computing in the graduate course CISC 879 Unconventional Computing. On some occasions, I gave lectures in CISC 203 Discrete mathematics for Computing Science as a supply instructor (also from the position of teaching assistant). Leadership / Administrative Positions - Coordinator of the College of Computer Engineering and Science, female campus present. Prince Mohammad University, Kingdom of Saudi Arabia.

6 - Member of the Curriculum Review Committee for the Computer Science study plan. Spring Prince Mohammad University, College of Computer Engineering and Science, Kingdom of Saudi Arabia. Employment - Assistant Professor present. University of Dammam, College of Computer Science and IT, Kingdom of Saudi Arabia. - Assistant Professor Prince Mohammad University, College of Computer Engineering and Science, Kingdom of Saudi Arabia. - Teaching and Research Assistant Queen s University, Dept. of Computing and Information Science, Kingston, Ontario, during Ph.D. program. - Software Developer Molecular Mining Inc., KIngston, Ontario, Canada. - Teaching and Research Assistant Queen s University, Dept. of Computing and Information Science, Kingston, Ontario, during M.Sc. program. - Research Assistant Institue of Isotope and Molecular Techology, Cluj, Romania. - Programmer Tricotaje Somesul, Cluj-Napoca, Romania. - Teaching Assistant Technical University of Cluj-Napoca, Faculty of Automation and Computer Science.