The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 551 to 575 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #382
09/10/2008
Virtualization: Resource Coupling and Security across the Stack

Virtualization: Resource Coupling and Security across the Stack

Dennis Moreau - Configuresoft

Episode #381
09/03/2008
Private Queries in Location Based Services:  Anonymizers are not Necessary

Private Queries in Location Based Services: Anonymizers are not Necessary

Gabriel Ghinita - Purdue University

Episode #380
08/27/2008
Exploitable Redirects on the Web: Identification, Prevalence, and Defense

Exploitable Redirects on the Web: Identification, Prevalence, and Defense

Minaxi Gupta - Indiana University

04/23/2008

TBA

Episode #379
04/16/2008
Static source code analysis

Static source code analysis

Jacob West - Fortify Software

Episode #378
04/09/2008
Shifting focus:  Aligning security with risk management

Shifting focus: Aligning security with risk management

Jack Jones - Risk Management Insight

Episode #377
04/02/2008
Exploiting Opportunistic Scheduling in Cellular Data Networks

Exploiting Opportunistic Scheduling in Cellular Data Networks

Hao Chen - University of California, Davis

Episode #376
03/26/2008
Towards Event Source Location Privacy in Wireless Sensor Networks

Towards Event Source Location Privacy in Wireless Sensor Networks

Sencun Zhu - Pennsylvania State

Episode #374
03/05/2008
Hacking the Mobile Workforce

Hacking the Mobile Workforce

Daniel Hoffman - Fiberlink Communications

Episode #373
02/27/2008
Managing Security Polarities

Managing Security Polarities

Buzz Walsh - Booz Allen Hamilton

Episode #371
02/13/2008
Beyond the Enclave: Evolving Concepts in Security Architectures

Beyond the Enclave: Evolving Concepts in Security Architectures

Myron Cramer - Essex

Episode #370
02/06/2008

A Question of Security

Carlos Solari - Alcatel-Lucent

Episode #368
01/23/2008
Electronic Voting: Danger and Opportunity

Electronic Voting: Danger and Opportunity

Edward W. Felten - Princeton University

Episode #367
01/16/2008
Tor: Anonymous communications for government agencies, corporations, journalists... and you

Tor: Anonymous communications for government agencies, corporations, journalists... and you

Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)

Episode #366
01/09/2008
Security in a Changing World

Security in a Changing World

Eric Cole - Lockheed Martin

12/05/2007

Canceled

Episode #365
11/28/2007
CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations

CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations

Ventkat Venkatakrishnan - University of Illinois at Chicago

Episode #364
11/14/2007
Wireless Router Insecurity: The Next Crimeware Epidemic

Wireless Router Insecurity: The Next Crimeware Epidemic

Steve Myers, Indiana University - Indiana University

Episode #362
10/31/2007
Protocols and Systems for Privacy Preserving Protection of Digital Identity

Protocols and Systems for Privacy Preserving Protection of Digital Identity

Abhilasha Bhargav-Spantzel - Purdue University

Episode #361
10/24/2007
Secure Virtualization

Secure Virtualization

George Heron - McAfee

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!