Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 276 to 300 of 894Affiliation shown is the affiliation at the time the talk was given.
Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations
Endadul Hoque
Batch Techniques for Practical Private Information Retrieval
Ryan Henry - Indiana University
Context Aware, Policy based approaches to Security
Anupam Joshi - University of Maryland, Baltimore County
Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
Xukai Zou - Indiana University-Purdue University Indianapolis
IN-ISAC: SOC, Security Awareness and More
Nicholas Sturgeon - Indiana Office of Technology
Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
Chris Clifton - Purdue University
Preventing or Penalizing Equivocation in Decentralized Environments
Aniket Kate - Purdue University
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
Laura Amo - SUNY Buffalo
A Secure Communication Protocol for Drones and Smart Objects
Jongho Won - Purdue University
Secure Multiparty Computation and Differential Privacy
Balamurugan Anandan - Purdue University
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Kate Seigfried-Spellar - Purdue University
A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
Fang-Yu Rao - Purdue University
The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
Kevin McPeak - Symantec
Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
Omar Chowdhury - Purdue University