Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1969 |

Results

Showing: 301 to 325 of 814
10/03/2012
Defending Users Against Smartphone Apps: Techniques and Future Directions

Defending Users Against Smartphone Apps: Techniques and Future Directions

William Enck - North Carolina State University

09/12/2012
Trends in cyber security consulting

Trends in cyber security consulting

Sharon Chand & Chad Whitman - Deloitte & Touche

09/05/2012
The Inertia of Productivity

The Inertia of Productivity

Ed Lopez - Fortinet

08/29/2012
Challenges for R&D in the Security Field

Challenges for R&D in the Security Field

Lewis Shepherd - Microsoft

08/22/2012
The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers

Scott Andersen - Lockheed Martin

04/25/2012
A Practical Beginners' Guide to Differential Privacy

A Practical Beginners' Guide to Differential Privacy

Christine Task - Purdue University

04/11/2012
: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach

Traian Truta - Northern Kentucky University

04/04/2012

J.R. Rao, IBM Research

J.R. Rao - IBM

03/28/2012
Privacy preserving attribute based group key management

Privacy preserving attribute based group key management

Nabeel Mohamed - PhD Candidate, Purdue University

03/07/2012
Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness

Chenyun Dai - Purdue University

02/29/2012
Cryptographic protocols in the era of cloud computing

Cryptographic protocols in the era of cloud computing

Nishanth Chandran - Microsoft Research

02/22/2012
Vulnerability Path and Assessment

Vulnerability Path and Assessment

Ben Calloni - Lockheed Martin

02/15/2012
Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Simson Garfinkel - Naval Postgraduate School

02/08/2012
Digital Citizenship:  A Target's View of Security and Life Online

Digital Citizenship: A Target's View of Security and Life Online

Kelley Misata - PhD Candidate, Purdue University

02/01/2012
Is it time to add Trust to the Future Internet/Web?

Is it time to add Trust to the Future Internet/Web?

George Vanecek - Futurewei Technologies

01/25/2012
A Flexible System for Access Control

A Flexible System for Access Control

Frank Tompa - University of Waterloo

01/18/2012
Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams

Salmin Sultana - Purdue University

01/11/2012
"Introduction to Biometrics"

"Introduction to Biometrics"

Stephen Elliott - Purdue University

12/07/2011

No Seminar

11/16/2011
Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers

Loukas Lazos - University of Arizona

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!