The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 576 to 600 of 899

Affiliation shown is the affiliation at the time the talk was given.

04/05/2006
Chaos,Complexity, Cybernetics and Therminator:

Chaos,Complexity, Cybernetics and Therminator:

Dave Ford - Naval Postgraduate School

03/29/2006
Spoofing-resistant Packet Routing for the Internet"

Spoofing-resistant Packet Routing for the Internet"

Minaxi Gupta - Indiana University

03/22/2006
Privacy Policies in Web-based Healthcare

Privacy Policies in Web-based Healthcare

Julie Earp - North Carolina State University

03/08/2006
Dynamic and Efficient Key Management for Access Hierarchies

Dynamic and Efficient Key Management for Access Hierarchies

Marina Blanton - Purdue University

03/01/2006
A Policy Engineering Framework for Federated Access Management

A Policy Engineering Framework for Federated Access Management

Rafae Bhatti - Purdue University

02/15/2006
Provable security in mobile ad hoc networks

Provable security in mobile ad hoc networks

Mike Burmester - Florida State

02/08/2006
Categories of Digital Forensic Investigation Techniques

Categories of Digital Forensic Investigation Techniques

Brian Carrier - Purdue University

02/01/2006
Digital Identity Management and Theft Protection

Digital Identity Management and Theft Protection

Abhilasha Bhargav-Spantzel - Purdue University

01/25/2006
Semantic Attacks and Security

Semantic Attacks and Security

Paul Thompson - Dartmouth College

01/18/2006
Net Trust:  Identification Through Social Context

Net Trust: Identification Through Social Context

Jean Camp - Indiana University

01/11/2006
Cross-Drive Forensic Analysis

Cross-Drive Forensic Analysis

Simson Garfinkel - Harvard University

12/07/2005
Clouseau: A practical IP spoofing defense through route-based filtering

Clouseau: A practical IP spoofing defense through route-based filtering

Jelena Mirkovic - University of Delaware

11/30/2005
Secret Handshakes

Secret Handshakes

Stanislaw Jarecki - University of California at Irvine

11/16/2005
Privacy-preserving Policy-driven Access Control with Mixed Credentials

Privacy-preserving Policy-driven Access Control with Mixed Credentials

Shouhuai Xu - University of Texas at San Antonio

11/09/2005
Privacy and anonymity in Trust Negotiations".

Privacy and anonymity in Trust Negotiations".

Anna Squicciarini - University of Milano

10/19/2005
Toward Self-healing Software

Toward Self-healing Software

Dr. Angelos D. Keromytis - Columbia

10/12/2005

Aligning Privacy Values, Policies, Law and Software Requirements

Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org

10/05/2005
Securing the Internet's Domain Name System

Securing the Internet's Domain Name System

Dan Massey - Colorado State University

09/28/2005

Managing Risk of Information Systems Security Incidents

Dr. Fariborz Farahmand - Purdue University/CERIAS

09/21/2005
A Framework for Identifying Compromised Nodes in Sensor Networks

A Framework for Identifying Compromised Nodes in Sensor Networks

Ting Yu - North Carolina State University

09/14/2005
Toward Hazard Aware Spaces:  Knowing Where, When and What Hazards Occur

Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur

Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!