Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 501 to 525 of 899Affiliation shown is the affiliation at the time the talk was given.

The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
Scott Orton - Ratheon

Trends in Identity Management
Kenji Takahashi - ITT Information Sharing Platform Laboratories

Signature Analysis Coupled With Slicing Analysis for the Validation of Software
Adam Dugger - Arxan

Measuring the Attack Surfaces of Enterprise Software Systems
Yuecel Karabulut - SAP Research

Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
Shimon Modi - Purdue University

Virtualization: Resource Coupling and Security across the Stack
Dennis Moreau - Configuresoft

Private Queries in Location Based Services: Anonymizers are not Necessary
Gabriel Ghinita - Purdue University

Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Minaxi Gupta - Indiana University

Shifting focus: Aligning security with risk management
Jack Jones - Risk Management Insight

Exploiting Opportunistic Scheduling in Cellular Data Networks
Hao Chen - University of California, Davis

Towards Event Source Location Privacy in Wireless Sensor Networks
Sencun Zhu - Pennsylvania State
Multiple Independent Levels of Security Architecture: A High Robustness Approach Using COTS
Ben Calloni - Lockheed Martin

Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
Ta-Wei "David" Wang - Purdue University

What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
Anand Singh - Target Corporation
Ways to Watch
