Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1970 |
Results
Showing: 551 to 575 of 927Affiliation shown is the affiliation at the time the talk was given.
What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
Anand Singh - Target Corporation
Tor: Anonymous communications for government agencies, corporations, journalists... and you
Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)
CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
Ventkat Venkatakrishnan - University of Illinois at Chicago
Wireless Router Insecurity: The Next Crimeware Epidemic
Steve Myers, Indiana University - Indiana University
Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing
Richard Thieme - ThiemeWorks
Protocols and Systems for Privacy Preserving Protection of Digital Identity
Abhilasha Bhargav-Spantzel - Purdue University
From Securing Navigation Systems to Securing Wireless Communication
Srdjan Capkun - ETH Zurich
What Every Engineer Needs To Know About Security And Where To Learn It
Neil Daswani - Google
Do You Have My Data? Prove it! (Provable Data Possession at Untrusted Stores)
Reza Curtmola - Purdue University
Protecting Data Privacy: A Practical Guide to Managing Risk
Jill Frisby - Crowe Chizek and Company LLC
Applying Recreational Mathematics to Secure Multiparty Computation
Yvo Desmedt - University College, London
Towards Effective and Efficient Behavior-based Trust Models
Klemens Boehm - Karlsruhe University
Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
Umut Topkara - Purdue University
Hiding the Message Behind the Words: Advances in Natural Language Watermarking
Mercan Topkara - Purdue University
How the Criminal Law Must Adapt to the Networked World
Richard Downing - US Department of Justice
Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Dr. Albert M. K. Cheng - University of Houston
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List








