Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 551 to 575 of 913Affiliation shown is the affiliation at the time the talk was given.
Do You Have My Data? Prove it! (Provable Data Possession at Untrusted Stores)
Reza Curtmola - Purdue University

Protecting Data Privacy: A Practical Guide to Managing Risk
Jill Frisby - Crowe Chizek and Company LLC

Applying Recreational Mathematics to Secure Multiparty Computation
Yvo Desmedt - University College, London

Towards Effective and Efficient Behavior-based Trust Models
Klemens Boehm - Karlsruhe University

Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
Umut Topkara - Purdue University

Hiding the Message Behind the Words: Advances in Natural Language Watermarking
Mercan Topkara - Purdue University
How the Criminal Law Must Adapt to the Networked World
Richard Downing - US Department of Justice

Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Dr. Albert M. K. Cheng - University of Houston

Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
Eugene Schultz - High Tower Software

Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
Bhavani Thuraisingham - The University of Texas at Dallas

Cyber Security and the "NEW" world enterprise
Howard Schmidt - R & H Security Consulting LLC

Scenario-Driven Construction of Enterprise Information Policy
Stuart Shapiro - The MITRE Corporation

Computer-Related Incidents: Factors Related to Cause and Prevention
Virginia Rezmierski - University of Michigan

The Psychology of Computer Deviance: How it can assist in digital evidence analysis.
Marc Rogers - Purdue University

OS-Level Taint Analysis for Malware Investigation and Defense
Dongyan Xu - Purdue University

One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
Richard Power - GS(3) Intelligence & Words of Power
Ways to Watch
