The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 501 to 525 of 875

Affiliation shown is the affiliation at the time the talk was given.

01/23/2008
Electronic Voting: Danger and Opportunity

Electronic Voting: Danger and Opportunity

Edward W. Felten - Princeton University

01/16/2008
Tor: Anonymous communications for government agencies, corporations, journalists... and you

Tor: Anonymous communications for government agencies, corporations, journalists... and you

Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)

01/09/2008
Security in a Changing World

Security in a Changing World

Eric Cole - Lockheed Martin

12/05/2007

Canceled

11/28/2007
CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations

CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations

Ventkat Venkatakrishnan - University of Illinois at Chicago

11/14/2007
Wireless Router Insecurity: The Next Crimeware Epidemic

Wireless Router Insecurity: The Next Crimeware Epidemic

Steve Myers, Indiana University - Indiana University

10/31/2007
Protocols and Systems for Privacy Preserving Protection of Digital Identity

Protocols and Systems for Privacy Preserving Protection of Digital Identity

Abhilasha Bhargav-Spantzel - Purdue University

10/24/2007
Secure Virtualization

Secure Virtualization

George Heron - McAfee

09/26/2007
The Effect of Rootkits on the Corporate Environment

The Effect of Rootkits on the Corporate Environment

David Ehinger - Rolls Royce

09/19/2007
Protecting Data Privacy: A Practical Guide to Managing Risk

Protecting Data Privacy: A Practical Guide to Managing Risk

Jill Frisby - Crowe Chizek and Company LLC

09/12/2007
Security issues within embedded software development

Security issues within embedded software development

Ron Buskey - Motorola

09/05/2007
Applying Recreational Mathematics to Secure Multiparty Computation

Applying Recreational Mathematics to Secure Multiparty Computation

Yvo Desmedt - University College, London

08/29/2007
Towards Effective and Efficient Behavior-based Trust Models

Towards Effective and Efficient Behavior-based Trust Models

Klemens Boehm - Karlsruhe University

08/22/2007
Role Discovery

Role Discovery

Bill Horne - HP Labs

04/11/2007
Dumb Ideas in Computer Security

Dumb Ideas in Computer Security

Dr. Charles P. Pfleeger - Pfleeger Consulting Group

04/04/2007

How the Criminal Law Must Adapt to the Networked World

Richard Downing - US Department of Justice

03/21/2007
A quant looks at the future

A quant looks at the future

Dan Geer - Geer Risk Services, LLC

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!