Archive

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 501 to 525 of 731
03/26/2003

Security Seminar


Mark McGovern - In-Q-Tel
03/12/2003

Solid Software: Is it Rocket Science?


Shari Lawrence Pfleeger, PhD - RAND
03/05/2003

Computational Number Theory and Cryptography


Andreas Stein - UIUC Math Department
02/19/2003

International Coordination to Increase the Security of Critical Network


Dr. Seymour E. Goodman - Georgia Institute of Technology
02/12/2003

PRIMES is in P


Samuel S. Wagstaff, Jr. - CERIAS
02/05/2003

Cryptographic mistakes you should avoid


Samuel S. Wagstaff, Jr. - CERIAS
01/22/2003

Identifier-Based Encryption


Keith Harrison - HP Trusted Computing Lab
01/15/2003

OpenTrusted Computing: Big Brother Inside?


Stefek Zaba - HPLabs Trusted Computing Lab
12/04/2002

Security Seminar


Steve Crutchley - 4FrontSecurity Inc.
11/20/2002

Security Seminar



11/13/2002

Security Seminar



11/06/2002

Intruder Identification in Mobile Ad Hoc Networks


Bharat Bhargava - CERIAS Security Center and Computer Science Department, Purdue University
10/23/2002

Lessons From The History of Computer Security


Bob Abbott - Consultant
10/16/2002

Security Seminar



10/09/2002

Security Seminar


Walid Aref - Purdue University Dept. of Computer Sciences
10/02/2002

Reference Models for Network Origin Concealment and Identification


Tom Daniels - Iowa State University
09/11/2002

Information Security & Industrial Relations


Carl Botan - Purdue University Dept. of Communication
09/04/2002

A Fast Encryption Algorithm, Tame Transformation Method (TTM), with Signature and Master Key functions


Tzuong-Tsieng Moh - Purdue University Department of Mathematics

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information