CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 226 to 250 of 669
04/14/2010

Security of JavaScript in a Browser Environment

Security of JavaScript in a Browser Environment


Christian Hammer - Purdue University
(448.0MB): Video Icon MP4 Video   Watch on Youtube
04/07/2010

60 years of scientific research in cryptography:  a reflection

60 years of scientific research in cryptography: a reflection


Yvo Desmedt - University College London, UK
(449.3MB): Video Icon MP4 Video   Watch on Youtube
03/31/2010

Everything I Needed to Know about Security, I Learned in 1974

Everything I Needed to Know about Security, I Learned in 1974


David Bell - Retired
(452.5MB): Video Icon MP4 Video   Watch on Youtube
03/24/2010

A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems

A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems


David Zage - Purdue University
(463.0MB): Video Icon MP4 Video   Watch on Youtube
03/10/2010

Making of the CWE Top-25, 2010 Edition

Making of the CWE Top-25, 2010 Edition


Pascal Meunier - Purdue University
(444.7MB): Video Icon MP4 Video   Watch on Youtube
02/24/2010

Ribbons, A Partially-Shared Memory Programming Model

Ribbons, A Partially-Shared Memory Programming Model


Kevin Hoffman - PhD candidate in the Computer Science, Purdue University
(418.4MB): Video Icon MP4 Video   Watch on Youtube
02/17/2010

Provenance-based Data Trustworthiness Assessment in Data Streams

Provenance-based Data Trustworthiness Assessment in Data Streams


Hyo-Sang Lim - Purdue University
(379.8MB): Video Icon MP4 Video   Watch on Youtube
02/10/2010

Dissecting Digital Data: Context & Meaning through Analytics

Dissecting Digital Data: Context & Meaning through Analytics


Marcus Rogers - Purdue University
(465.4MB): Video Icon MP4 Video   Watch on Youtube
02/03/2010

Detecting Insider Theft of Trade Secrets

Detecting Insider Theft of Trade Secrets


Greg Stephens - Mitre
(429.3MB): Video Icon MP4 Video   Watch on Youtube
01/27/2010

Fast-flux Attacks


Shijie Zhou - University of Electronic Science and Technology of China
01/20/2010

Applications of biometric technologies

Applications of biometric technologies


Stephen Elliott - Purdue University
(416.3MB): Video Icon MP4 Video   Watch on Youtube
01/13/2010


"Thinking Outside the Box"


Eugene Spafford - Purdue University
(443.9MB): Video Icon MP4 Video   Watch on Youtube
12/09/2009

 Human Factors Approaches to Preserving Privacy

Human Factors Approaches to Preserving Privacy


Kelly Caine - Indiana University
(456.3MB): Video Icon MP4 Video   Watch on Youtube
12/02/2009

Cyber Security Trends and Disruptors

Cyber Security Trends and Disruptors


Andrew Scholnick - Verisign
(476.3MB): Video Icon MP4 Video   Watch on Youtube
11/18/2009

Safely Analyzing Sensitive Network Data

Safely Analyzing Sensitive Network Data


Gerome Miklau - University of Massachusetts, Amherst
(477.3MB): Video Icon MP4 Video   Watch on Youtube
11/04/2009

Multi-Policy Access Control for Healthcare using Policy Machine

Multi-Policy Access Control for Healthcare using Policy Machine


Zahid Pervaiz - Purdue University
(244.6MB): Video Icon MP4 Video   Watch on Youtube
10/21/2009

Information Security Management and IT Executives in a Top Management Team

Information Security Management and IT Executives in a Top Management Team


Juhee Kwon - Purdue University
(551.7MB): Video Icon MP4 Video   Watch on Youtube
10/14/2009

PlugNPlay Trust for Embedded Communication Systems

PlugNPlay Trust for Embedded Communication Systems


Raquel Hill - Indiana University
(350.7MB): Video Icon MP4 Video   Watch on Youtube
10/07/2009

The Building Security In Maturity Model (BSIMM)

The Building Security In Maturity Model (BSIMM)


Gary McGraw - Cigital, Inc
(610.9MB): Video Icon MP4 Video   Watch on Youtube
09/30/2009

Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security

Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security


Richard Power - CyLab - Carnegie Mellon
(708.5MB): Video Icon MP4 Video   Watch on Youtube
09/23/2009

The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw

The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw


Rick Aldrich - Booz Allen Hamilton
(650.3MB): Video Icon MP4 Video   Watch on Youtube
09/16/2009

From Security Architecture to Implementation

From Security Architecture to Implementation


Jerry Saulman - IBM
(497.1MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.