The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 476 to 500 of 940

Affiliation shown is the affiliation at the time the talk was given.

02/02/2011

Campus closed/snow

Episode #457
01/26/2011
User and Machine Authentication and Authorization Infrastructure for  Distributed Testbeds

User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds

Torsten Braun - University of Bern

Episode #456
01/19/2011
Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security

Somesh Jha - University of Wisconsin

Episode #455
01/12/2011
Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud

Fariborz Farahmand - Purdue University

Episode #454
12/08/2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory

Junghwan Rhee - Purdue University

Episode #453
12/01/2010
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Matthew Hashim - Purdue University

Episode #452
11/17/2010
Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions

Michael Kirkpatrick - Purdue University

Episode #451
11/10/2010
Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis

Nikita Borisov - University of Illinois at Urbana-Champaign

Episode #450
11/03/2010
Tackling System-Wide Integrity

Tackling System-Wide Integrity

Trent Jaeger - Pennsylvania State

Episode #449
10/27/2010
The Role of Automata Theory in Software Verification

The Role of Automata Theory in Software Verification

P. Madhusudan - University of Illinois at Urbana-Champaign

Episode #448
10/20/2010
Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System

Sam King - University of Illinois

Episode #446
10/06/2010
Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations

Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University

Episode #445
09/29/2010
Assured Processing through Obfuscation

Assured Processing through Obfuscation

Sergey Panasyuk - Air Force Research Laboratory

Episode #444
09/22/2010
Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)

Petros Mouchtaris - Telcordia

Episode #443
09/15/2010
Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses

Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses

Xiaofeng Wang - Indiana University

Episode #442
09/08/2010
Rootkits

Rootkits

Xeno Kovah - MITRE

Episode #441
09/01/2010
Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking

Ashish Kundu - Purdue University

Episode #440
08/25/2010
Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks

Cristina Nita-Rotaru - Purdue University

Episode #439
04/28/2010
Ontological Semantic Technology for Detecting  Insider Threat and Social Engineering

Ontological Semantic Technology for Detecting Insider Threat and Social Engineering

Victor Raskin & Julia Taylor - Purdue University

Episode #438
04/21/2010
The role of System Security Engineering in the engineering lifecycle

The role of System Security Engineering in the engineering lifecycle

Stephen Dill - Lockheed Martin

Episode #437
04/14/2010
Security of JavaScript in a Browser Environment

Security of JavaScript in a Browser Environment

Christian Hammer - Purdue University

Episode #436
04/07/2010
60 years of scientific research in cryptography:  a reflection

60 years of scientific research in cryptography: a reflection

Yvo Desmedt - University College London, UK

Episode #435
03/31/2010
Everything I Needed to Know about Security, I Learned in 1974

Everything I Needed to Know about Security, I Learned in 1974

David Bell - Retired

Episode #434
03/24/2010
A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems

A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems

David Zage - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!