Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 501 to 525 of 875Affiliation shown is the affiliation at the time the talk was given.
What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
Anand Singh - Target Corporation
Tor: Anonymous communications for government agencies, corporations, journalists... and you
Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)
CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
Ventkat Venkatakrishnan - University of Illinois at Chicago
Wireless Router Insecurity: The Next Crimeware Epidemic
Steve Myers, Indiana University - Indiana University
Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing
Richard Thieme - ThiemeWorks
Protocols and Systems for Privacy Preserving Protection of Digital Identity
Abhilasha Bhargav-Spantzel - Purdue University
From Securing Navigation Systems to Securing Wireless Communication
Srdjan Capkun - ETH Zurich
What Every Engineer Needs To Know About Security And Where To Learn It
Neil Daswani - Google
Do You Have My Data? Prove it! (Provable Data Possession at Untrusted Stores)
Reza Curtmola - Purdue University
Protecting Data Privacy: A Practical Guide to Managing Risk
Jill Frisby - Crowe Chizek and Company LLC
Applying Recreational Mathematics to Secure Multiparty Computation
Yvo Desmedt - University College, London
Towards Effective and Efficient Behavior-based Trust Models
Klemens Boehm - Karlsruhe University
Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
Umut Topkara - Purdue University
Hiding the Message Behind the Words: Advances in Natural Language Watermarking
Mercan Topkara - Purdue University
How the Criminal Law Must Adapt to the Networked World
Richard Downing - US Department of Justice
Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Dr. Albert M. K. Cheng - University of Houston