Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 301 to 325 of 916Affiliation shown is the affiliation at the time the talk was given.

Batch Techniques for Practical Private Information Retrieval
Ryan Henry - Indiana University

Context Aware, Policy based approaches to Security
Anupam Joshi - University of Maryland, Baltimore County

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
Xukai Zou - Indiana University-Purdue University Indianapolis

IN-ISAC: SOC, Security Awareness and More
Nicholas Sturgeon - Indiana Office of Technology

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
Chris Clifton - Purdue University

Preventing or Penalizing Equivocation in Decentralized Environments
Aniket Kate - Purdue University

Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
Laura Amo - SUNY Buffalo

A Secure Communication Protocol for Drones and Smart Objects
Jongho Won - Purdue University

Secure Multiparty Computation and Differential Privacy
Balamurugan Anandan - Purdue University

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Kate Seigfried-Spellar - Purdue University

A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
Fang-Yu Rao - Purdue University

The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
Kevin McPeak - Symantec

Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
Omar Chowdhury - Purdue University

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Yonghwi Kwon - Purdue University

SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
Jianjun Huang - Purdue University

Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
Samuel Jero - Purdue University
Ways to Watch
