CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 201 to 225 of 699
02/29/2012

Cryptographic protocols in the era of cloud computing

Cryptographic protocols in the era of cloud computing


Nishanth Chandran - Microsoft Research
(552.9MB): Video Icon MP4 Video   Watch on Youtube
02/22/2012

Vulnerability Path and Assessment

Vulnerability Path and Assessment


Ben Calloni - Lockheed Martin
(537.9MB): Video Icon MP4 Video   Watch on Youtube
02/15/2012

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow


Simson Garfinkel - Naval Postgraduate School
(532.8MB): Video Icon MP4 Video   Watch on Youtube
02/08/2012

Digital Citizenship:  A Target's View of Security and Life Online

Digital Citizenship: A Target's View of Security and Life Online


Kelley Misata - PhD Candidate, Purdue University
(544.4MB): Video Icon MP4 Video   Watch on Youtube
02/01/2012

Is it time to add Trust to the Future Internet/Web?

Is it time to add Trust to the Future Internet/Web?


George Vanecek - Futurewei Technologies
(547.3MB): Video Icon MP4 Video   Watch on Youtube
01/25/2012

A Flexible System for Access Control

A Flexible System for Access Control


Frank Tompa - University of Waterloo
(543.0MB): Video Icon MP4 Video   Watch on Youtube
01/18/2012

 Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams


Salmin Sultana - Purdue University
(517.4MB): Video Icon MP4 Video   Watch on Youtube
01/11/2012


"Introduction to Biometrics"


Stephen Elliott - Purdue University
(442.4MB): Video Icon MP4 Video   Watch on Youtube
12/07/2011

No Seminar



11/30/2011

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones


Apu Kapadia - Indiana University
(447.9MB): Video Icon MP4 Video   Watch on Youtube
11/16/2011

Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers


Loukas Lazos - University of Arizona
(443.7MB): Video Icon MP4 Video   Watch on Youtube
11/09/2011

Process Implanting: A New Active Introspection Framework for Virtualization

Process Implanting: A New Active Introspection Framework for Virtualization


Zhongshu Gu - Purdue University
(445.3MB): Video Icon MP4 Video   Watch on Youtube
10/26/2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack


Sheila Becker - University of Luxembourgh
(446.8MB): Video Icon MP4 Video   Watch on Youtube
10/19/2011

Ontological Semantic Technology Goes Phishing

Ontological Semantic Technology Goes Phishing


Julia M. Taylor, Victor Raskin, and Eugene H. Spafford - Purdue University
(446.3MB): Video Icon MP4 Video   Watch on Youtube
10/12/2011

Enterprise-Wide Intrusions Involving Advanced Threats

Enterprise-Wide Intrusions Involving Advanced Threats


Dan McWhorter and Steve Surdu - Mandiant Corporation
(443.0MB): Video Icon MP4 Video   Watch on Youtube
10/05/2011

Trusted Computing and Security for Embedded Systems

Trusted Computing and Security for Embedded Systems


Hal Aldridge - Sypris Electronics
(445.0MB): Video Icon MP4 Video   Watch on Youtube
09/28/2011

Weighted Multiple Secret Sharing

Weighted Multiple Secret Sharing


Xukai Zou - Indiana University-Purdue University Indianapolis
(449.7MB): Video Icon MP4 Video   Watch on Youtube
09/21/2011

 Methods and Techniques for Protecting Data in Real Time on the Wire

Methods and Techniques for Protecting Data in Real Time on the Wire


Joe Leonard - Global Velocity
(444.0MB): Video Icon MP4 Video   Watch on Youtube
09/07/2011

Detecting Bots in Online Games using Human Observational Proofs

Detecting Bots in Online Games using Human Observational Proofs


Steven Gianvecchio - MITRE
(445.0MB): Video Icon MP4 Video   Watch on Youtube
08/31/2011

Non-homogeneous anonymizations

Non-homogeneous anonymizations


Tamir Tassa - The Open University, Israel
(447.7MB): Video Icon MP4 Video   Watch on Youtube
08/24/2011

Provisioning Protocol Challenges in an Era of gTLD Expansion

Provisioning Protocol Challenges in an Era of gTLD Expansion


Scott Hollenbeck - Verisign
(443.6MB): Video Icon MP4 Video   Watch on Youtube
04/27/2011

Mobile Phones and Evidence Preservation

Mobile Phones and Evidence Preservation


Eric Katz - Purdue University
(447.7MB): Video Icon MP4 Video   Watch on Youtube
04/20/2011


"Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet"


Jose Fernandez - Montreal Polytechnic
(445.8MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.