CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 376 to 400 of 673
08/31/2005

Minimizing Trust Liabilities in Secure Group Messaging  Infrastructures

Minimizing Trust Liabilities in Secure Group Messaging Infrastructures


Himanshu Khurana - University of Illinois at Urbana-Champaign
(93.0MB): Video Icon MP4 Video   Watch on Youtube
08/24/2005

An Introduction to Biometric Technologies

An Introduction to Biometric Technologies


Stephen Elliott - Purdue University
(220.3MB): Video Icon MP4 Video   Watch on Youtube
04/27/2005

PrivacyEnhancing k-Anonymization of Customer Data

PrivacyEnhancing k-Anonymization of Customer Data


Sheng Zhong - SUNY at Buffalo
(218.2MB): Video Icon MP4 Video  
04/20/2005

Traust and PeerTrust2:  Applying Trust Negotiation to Real Systems

Traust and PeerTrust2: Applying Trust Negotiation to Real Systems


Marianne Winslett - University of Illinois at Urbana-Champaign
(156.4MB): Video Icon MP4 Video   Watch on Youtube
04/13/2005

Watermarking Relational Databases

Watermarking Relational Databases


Mohamed Shehab - Purdue University
(130.8MB): Video Icon MP4 Video   Watch on Youtube
04/06/2005

Defining a Digital Forensic Investigation

Defining a Digital Forensic Investigation


Brian Carrier - Purdue University
(170.8MB): Video Icon MP4 Video   Watch on Youtube
03/30/2005

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks


Helen J. Wang - Microsoft Research
(214.5MB): Video Icon MP4 Video   Watch on Youtube
03/23/2005

Lockheed Martin

Lockheed Martin


Dr. Kate Cherry and Dr. Wendy Hamilton - Lockheed Martin
(219.9MB): Video Icon MP4 Video   Watch on Youtube
03/09/2005

Where's the FEEB? Effectiveness of Instruction Set Randomization

Where's the FEEB? Effectiveness of Instruction Set Randomization


David Evans - University of Virginia
(142.1MB): Video Icon MP4 Video   Watch on Youtube
03/02/2005

Using process labels to obtain forensic and traceback information

Using process labels to obtain forensic and traceback information


Florian Buchholz - Purdue University
(220.4MB): Video Icon MP4 Video   Watch on Youtube
02/23/2005

Perturbation of Multivariable Public-key Cryptosystems

Perturbation of Multivariable Public-key Cryptosystems


Jintai Ding - University of Cincinnati
(182.0MB): Video Icon MP4 Video   Watch on Youtube
02/09/2005

Architectural Considerations for Anomaly Detection

Architectural Considerations for Anomaly Detection


Wenke Lee - Georgia Tech
(122.7MB): Video Icon MP4 Video   Watch on Youtube
02/02/2005

Obfuscated Databases: Definitions and Constructions

Obfuscated Databases: Definitions and Constructions


Vitaly Shmatikov - University of Texas at Austin
(220.4MB): Video Icon MP4 Video   Watch on Youtube
01/26/2005

Self Healing Cyber Databases Under Malicious Attacks


Peng Liu - Pennsylvania State
01/19/2005

Hidden Access Control Policies with Hidden Credentials

Hidden Access Control Policies with Hidden Credentials


Keith Frikken - Purdue University
(204.5MB): Video Icon MP4 Video   Watch on Youtube
01/12/2005

Survivable routing in wireless ad hoc networks

Survivable routing in wireless ad hoc networks


Cristina Nita-Rotaru - Purdue University
(220.5MB): Video Icon MP4 Video   Watch on Youtube
12/08/2004

Using Statistical Analysis to Locate Spam Web Pages

Using Statistical Analysis to Locate Spam Web Pages


Dennis Fetterly - Microsoft
(215.6MB): Video Icon MP4 Video   Watch on Youtube
12/01/2004

Attribute-Based Access Control

Attribute-Based Access Control


William Winsborough - George Mason University
(220.0MB): Video Icon MP4 Video   Watch on Youtube
11/17/2004

An Anonymous Fair-Exchange E-Commerce Protocol

An Anonymous Fair-Exchange E-Commerce Protocol


Indrakshi Ray - Colorado State University
(206.5MB): Video Icon MP4 Video   Watch on Youtube
11/10/2004

GTRBAC: A Generalized Temporal Role Based Access Control Model

GTRBAC: A Generalized Temporal Role Based Access Control Model


James Joshi - Pittsburgh University
(219.4MB): Video Icon MP4 Video   Watch on Youtube
11/03/2004

Towards Mining Syslog Data

Towards Mining Syslog Data


Abe Singer - University of California at San Diego
(218.9MB): Video Icon MP4 Video   Watch on Youtube
10/27/2004

Robustness testing - black-box testing for software security

Robustness testing - black-box testing for software security


Ari Takanen - Codenomicon Ltd.
(219.7MB): Video Icon MP4 Video   Watch on Youtube
10/20/2004

Effective and Efficient Intrusion Analysis


Peng Ning - NC State
10/13/2004

Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux


Dan Thomsen - Tresys Technology
(219.1MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.