Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 576 to 600 of 899Affiliation shown is the affiliation at the time the talk was given.

Dynamic and Efficient Key Management for Access Hierarchies
Marina Blanton - Purdue University

A Policy Engineering Framework for Federated Access Management
Rafae Bhatti - Purdue University
Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience
Yan Chen - Northwestern University

Categories of Digital Forensic Investigation Techniques
Brian Carrier - Purdue University

Digital Identity Management and Theft Protection
Abhilasha Bhargav-Spantzel - Purdue University

Clouseau: A practical IP spoofing defense through route-based filtering
Jelena Mirkovic - University of Delaware

Privacy-preserving Policy-driven Access Control with Mixed Credentials
Shouhuai Xu - University of Texas at San Antonio
The Ontology of Documents and the Technology of Identification
Barry Smith - SUNY Buffalo
Aligning Privacy Values, Policies, Law and Software Requirements
Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org
Managing Risk of Information Systems Security Incidents
Dr. Fariborz Farahmand - Purdue University/CERIAS

A Framework for Identifying Compromised Nodes in Sensor Networks
Ting Yu - North Carolina State University

Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur
Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)
Ways to Watch
