Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 201 to 225 of 879Affiliation shown is the affiliation at the time the talk was given.
Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.
Debajyoti Das - Purdue University
Symposium Closing Keynote - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years
Josh Corman - PTC
Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
Chris Reed - Eli Lilly
Mind Your Credit: Assessing the Health of the Ripple Credit Network
Pedro Moreno-Sanchez - Purdue University
What Roles Can Empirical Research Play to Advance Software Security Knowledge?
Lotfi ben-Othmane - Iowa State University
Securing the Future of Business: Broadening the Role of Security Technology
Kirsten Bay - Cyber adAPT
Refraction Networking: Censorship Circumvention in the Core of the Internet
Nikita Borisov - University of Illinois at Urbana-Champaign
Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
Jerome Edge - Lockheed Martin
Locally Differential Private Protocols for Frequency Estimation
Tianhao Wang - Purdue University