The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 201 to 225 of 879

Affiliation shown is the affiliation at the time the talk was given.

03/21/2018
Mind Your Credit: Assessing the Health of the Ripple Credit Network

Mind Your Credit: Assessing the Health of the Ripple Credit Network

Pedro Moreno-Sanchez - Purdue University

03/07/2018
CFIXX -- Object Type Integrity for C++

CFIXX -- Object Type Integrity for C++

Nathan Burrow - Purdue University

02/28/2018
Threats and Risks in Cryptocurrencies

Threats and Risks in Cryptocurrencies

Courtney Falk - Optiv

02/21/2018
Lessons Learned From the Retrocomputing Community

Lessons Learned From the Retrocomputing Community

Mitchell Parker - IU Health

02/14/2018
OBLIVIATE: A Data Oblivious File System for Intel SGX

OBLIVIATE: A Data Oblivious File System for Intel SGX

Adil Ahmad - Purdue University

01/31/2018
State of Cybersecurity in Healthcare

State of Cybersecurity in Healthcare

Matt Dimino - Eskenazi Health

01/24/2018
What Roles Can Empirical Research Play to Advance Software Security Knowledge?

What Roles Can Empirical Research Play to Advance Software Security Knowledge?

Lotfi ben-Othmane - Iowa State University

01/17/2018
The Economics of Offline Password Cracking

The Economics of Offline Password Cracking

Ben Harsha - Purdue University

12/06/2017
Penetration Testing: What? Why? How?

Penetration Testing: What? Why? How?

Nat Shere - Rook Security

11/08/2017
Refraction Networking: Censorship Circumvention in the Core of the Internet

Refraction Networking: Censorship Circumvention in the Core of the Internet

Nikita Borisov - University of Illinois at Urbana-Champaign

11/01/2017
Opportunities and Perils of the Cyber Revolution

Opportunities and Perils of the Cyber Revolution

Mikhail J. Atallah

10/18/2017
Locally Differential Private Protocols for Frequency Estimation

Locally Differential Private Protocols for Frequency Estimation

Tianhao Wang - Purdue University

10/11/2017
Memory Hard Functions and Password Hashing

Memory Hard Functions and Password Hashing

Jeremiah Blocki

09/27/2017
Vulnerability Scanning, how it works and why

Vulnerability Scanning, how it works and why

Tony Huffman - Tenable Network Security

09/20/2017
Counter UAS Challenges and Technology

Counter UAS Challenges and Technology

Vince D'Angelo - SRC

09/06/2017
Secure Code Development

Secure Code Development

Doug Smith - Northrop Grumman

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!