CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 401 to 425 of 673
10/06/2004

How to Forge Signatures and Be Happy About It


Giuseppe Ateniese - Johns Hopkins University
09/29/2004

Automatic Generation and Analysis of Attack Graphs


Jeannette Wing - Carnegie Mellon University
09/22/2004

Samuel D. Conte Distinguished Lecture Series


John Mitchell - Stanford University
09/15/2004

Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment


Gail-Joon Ahn - University of North Carolina at Charlotte
(212.2MB): Video Icon MP4 Video   Watch on Youtube
09/08/2004

Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration


Jason Crampton - Royal Holloway, University of London
(199.9MB): Video Icon MP4 Video   Watch on Youtube
09/01/2004

Privacy Technologies


Latanya Sweeney - Carnegie Mellon University
08/25/2004

Application of Thermodynamics to Computer Network Defense


Dave Ford - Naval Postgraduate School
04/21/2004

Improving audit sources by categorizing security monitoring systems


Benjamin Kuperman - PhD Candidate, Purdue University
04/14/2004

Secure Collaboration for Capacity Sharing in Logistics


Chris Clifton - Computer Science, Purdue University
04/07/2004

Security in Outsourced Databases


Gene Tsudik - UC Irvine
03/31/2004

Securing Wireless Sensor Networks


Wenliang (Kevin) Du - Syracuse University
03/24/2004

Managing Policy for Coordinated Defense


Clifford Neuman - ISI/USC
03/10/2004

Lessons from the EROS Experiment


Jonathan Shapiro - Johns Hopkins University
02/25/2004

Testing Computer Forensic Tools


James R. Lyle - National Institute of Standards and Technology
02/18/2004

Signatures, Heuristics and Behavior Blocking


Sarah Merrion - Symantec
02/11/2004

TrustBuilder: Automated Trust Negotiation in Open Systems


Kent Seamons - Brigham Young University
02/04/2004

Info Forthcoming


Prof. Steve Elliott - Purdue University
01/28/2004

Proactive Protection Against DDoS and Worm Attacks


Kihong Park - Computer Science, Purdue University
01/21/2004

Enabling Effective Trust Judgments


Sean Smith - Dartmouth College
01/14/2004

Privacy Preserving Data Mining on Vertically Partitioned Data


Jaideep Vaidya - Purdue University
12/10/2003

NL Downgrading, Sanitization, and Declassification


Dina Mohamed - Purdue University Department of Linguistics
12/03/2003

Using Criminal Law to Encourage the Prevention of Cybercrime


Susan Brenner - University of Dayton School of Law
11/19/2003

Natural Language Watermarking and Tamperproofing


Katrina E. Triezenberg - PhD Candidate, Purdue University

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.