Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 151 to 175 of 879Affiliation shown is the affiliation at the time the talk was given.
Automated Reasoning of Security and Privacy of Cellular Networks
Syed Rafiul Hussain - Purdue University
Immersive Virtual Insanity: Exploring Immersive Virtual Reality Security and Forensics
Abe Baggili - University of New Haven
Contactless Control Flow Monitoring via Electromagnetic Emanations
Sriharsha Etigowni - Purdue University
Fingerprinting Encrypted Voice Commands on Smart Speakers
Boyang Wang - University of Cincinnati
Forgetting the Forgotten: Conceal Content Deletions from Persistent Observers
Mohsen Minaei - Purdue University
Hacking Stressed: Frustration, burnout, and the pursuit of happiness
Celeste Paul - National Security Agency
Bitcoin and other dreams of utopian thinking-what happens when they meet reality?
Mitch Parker - IU Health
Moving Target Defense for a Serial Communication Protocol
Chris Jenkins - Sandia National Laboratories
A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience
Aritra Mitra - Purdue University
The Purdue Live Security Analyzer (PULSAR)
Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough - Purdue University
Protecting your online Identity in a world of modern application architecture
Robert Mundt - Eli Lilly and Company
Hardware Cybersecurity Attacks and Some Solutions
Krishna Kavi - University of North Texas
Efficient and Constant-Round Secure Comparison through Function Transformation, Dynamic Group Switching and Asymmetric Computation
Wei Jiang - University of Missouri-Columbia
Securing IoT-based Cyber-Physical Human Systems against diverse attacks
Sathish Kumar - Coastal Carolina University