Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 301 to 325 of 918Affiliation shown is the affiliation at the time the talk was given.

Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations
Endadul Hoque

Batch Techniques for Practical Private Information Retrieval
Ryan Henry - Indiana University

Context Aware, Policy based approaches to Security
Anupam Joshi - University of Maryland, Baltimore County

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
Xukai Zou - Indiana University-Purdue University Indianapolis

IN-ISAC: SOC, Security Awareness and More
Nicholas Sturgeon - Indiana Office of Technology

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
Chris Clifton - Purdue University

Preventing or Penalizing Equivocation in Decentralized Environments
Aniket Kate - Purdue University

Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
Laura Amo - SUNY Buffalo

A Secure Communication Protocol for Drones and Smart Objects
Jongho Won - Purdue University

Secure Multiparty Computation and Differential Privacy
Balamurugan Anandan - Purdue University

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Kate Seigfried-Spellar - Purdue University

A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
Fang-Yu Rao - Purdue University

The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
Kevin McPeak - Symantec

Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
Omar Chowdhury - Purdue University

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Yonghwi Kwon - Purdue University
Ways to Watch
