The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 326 to 350 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #601
03/09/2016
Batch Techniques for Practical Private Information Retrieval

Batch Techniques for Practical Private Information Retrieval

Ryan Henry - Indiana University

Episode #600
03/02/2016
Context Aware, Policy based approaches to Security

Context Aware, Policy based approaches to Security

Anupam Joshi - University of Maryland, Baltimore County

Episode #599
02/24/2016
Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule

Xukai Zou - Indiana University-Purdue University Indianapolis

Episode #598
02/17/2016
Predicting What Users Will do Next

Predicting What Users Will do Next

Bruno Ribeiro - Purdue University

Episode #597
02/10/2016
IN-ISAC: SOC, Security Awareness and More

IN-ISAC: SOC, Security Awareness and More

Nicholas Sturgeon - Indiana Office of Technology

Episode #596
02/03/2016
Robust Secure Computation

Robust Secure Computation

Hemanta Maji - Purdue University

Episode #595
01/27/2016
Big Data Security and Privacy

Big Data Security and Privacy

Elisa Bertino - Purdue University

Episode #594
01/20/2016
Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box

Chris Clifton - Purdue University

Episode #593
01/13/2016
Microsemi Security Solutions and Threat Driven Security

Microsemi Security Solutions and Threat Driven Security

Jim Gallagher - Microsemi

Episode #592
12/09/2015
Preventing or Penalizing Equivocation in Decentralized Environments

Preventing or Penalizing Equivocation in Decentralized Environments

Aniket Kate - Purdue University

Episode #590
11/18/2015
A Secure Communication Protocol for Drones and Smart Objects

A Secure Communication Protocol for Drones and Smart Objects

Jongho Won - Purdue University

Episode #589
11/11/2015
Verifying Computations with (Private) State

Verifying Computations with (Private) State

Ariel Feldman - University of Chicago

Episode #588
11/04/2015
Secure Multiparty Computation and Differential Privacy

Secure Multiparty Computation and Differential Privacy

Balamurugan Anandan - Purdue University

Episode #587
10/28/2015
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Kate Seigfried-Spellar - Purdue University

Episode #586
10/21/2015
Anonymized Data

Anonymized Data

Koray Mancuhan - Purdue University

Episode #581
09/16/2015
Evaluation of Urban Vehicle Tracking Algorithms

Evaluation of Urban Vehicle Tracking Algorithms

John Feddema - Sandia Labs

Episode #579
09/02/2015
SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps

SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps

Jianjun Huang - Purdue University

Episode #577
04/29/2015
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Steve Bellovin - Columbia University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!