Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 326 to 350 of 940Affiliation shown is the affiliation at the time the talk was given.
Batch Techniques for Practical Private Information Retrieval
Ryan Henry - Indiana University
Context Aware, Policy based approaches to Security
Anupam Joshi - University of Maryland, Baltimore County
Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
Xukai Zou - Indiana University-Purdue University Indianapolis
IN-ISAC: SOC, Security Awareness and More
Nicholas Sturgeon - Indiana Office of Technology
Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
Chris Clifton - Purdue University
Microsemi Security Solutions and Threat Driven Security
Jim Gallagher - Microsemi
Preventing or Penalizing Equivocation in Decentralized Environments
Aniket Kate - Purdue University
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
Laura Amo - SUNY Buffalo
A Secure Communication Protocol for Drones and Smart Objects
Jongho Won - Purdue University
Verifying Computations with (Private) State
Ariel Feldman - University of Chicago
Secure Multiparty Computation and Differential Privacy
Balamurugan Anandan - Purdue University
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Kate Seigfried-Spellar - Purdue University
A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
Fang-Yu Rao - Purdue University
The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
Kevin McPeak - Symantec
Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
Omar Chowdhury - Purdue University
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
Kexin Pei
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Yonghwi Kwon - Purdue University
SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
Jianjun Huang - Purdue University
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
Samuel Jero - Purdue University
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
Steve Bellovin - Columbia University
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List






