The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 576 to 600 of 883

Affiliation shown is the affiliation at the time the talk was given.

11/09/2005
Privacy and anonymity in Trust Negotiations".

Privacy and anonymity in Trust Negotiations".

Anna Squicciarini - University of Milano

10/19/2005
Toward Self-healing Software

Toward Self-healing Software

Dr. Angelos D. Keromytis - Columbia

10/12/2005

Aligning Privacy Values, Policies, Law and Software Requirements

Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org

10/05/2005
Securing the Internet's Domain Name System

Securing the Internet's Domain Name System

Dan Massey - Colorado State University

09/28/2005

Managing Risk of Information Systems Security Incidents

Dr. Fariborz Farahmand - Purdue University/CERIAS

09/21/2005
A Framework for Identifying Compromised Nodes in Sensor Networks

A Framework for Identifying Compromised Nodes in Sensor Networks

Ting Yu - North Carolina State University

09/14/2005
Toward Hazard Aware Spaces:  Knowing Where, When and What Hazards Occur

Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur

Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)

09/07/2005
Real World Web Application Security

Real World Web Application Security

Ed Finkler - CERIAS, Purdue University

08/31/2005
Minimizing Trust Liabilities in Secure Group Messaging  Infrastructures

Minimizing Trust Liabilities in Secure Group Messaging Infrastructures

Himanshu Khurana - University of Illinois at Urbana-Champaign

08/24/2005
An Introduction to Biometric Technologies

An Introduction to Biometric Technologies

Stephen Elliott - Purdue University

04/27/2005
PrivacyEnhancing k-Anonymization of Customer Data

PrivacyEnhancing k-Anonymization of Customer Data

Sheng Zhong - SUNY at Buffalo

04/20/2005
Traust and PeerTrust2:  Applying Trust Negotiation to Real Systems

Traust and PeerTrust2: Applying Trust Negotiation to Real Systems

Marianne Winslett - University of Illinois at Urbana-Champaign

04/13/2005
Watermarking Relational Databases

Watermarking Relational Databases

Mohamed Shehab - Purdue University

04/06/2005
Defining a Digital Forensic Investigation

Defining a Digital Forensic Investigation

Brian Carrier - Purdue University

03/23/2005
Lockheed Martin

Lockheed Martin

Dr. Kate Cherry and Dr. Wendy Hamilton - Lockheed Martin

03/09/2005
Where's the FEEB? Effectiveness of Instruction Set Randomization

Where's the FEEB? Effectiveness of Instruction Set Randomization

David Evans - University of Virginia

03/02/2005
Using process labels to obtain forensic and traceback information

Using process labels to obtain forensic and traceback information

Florian Buchholz - Purdue University

02/23/2005
Perturbation of Multivariable Public-key Cryptosystems

Perturbation of Multivariable Public-key Cryptosystems

Jintai Ding - University of Cincinnati

02/09/2005
Architectural Considerations for Anomaly Detection

Architectural Considerations for Anomaly Detection

Wenke Lee - Georgia Tech

02/02/2005
Obfuscated Databases: Definitions and Constructions

Obfuscated Databases: Definitions and Constructions

Vitaly Shmatikov - University of Texas at Austin

01/26/2005

Self Healing Cyber Databases Under Malicious Attacks

Peng Liu - Pennsylvania State

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!