Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 601 to 625 of 717
04/16/1999

Windows NT Network Security


E. Eugene Schultz - Global Integrity
04/09/1999

The Evolving Corporate Public-Key Infrastructure


Anish Bhimani - Global Integrity
03/26/1999

Oblivious transfer and its applications


Mikhail Atallah - CERIAS /Purdue CS Department
03/12/1999

Securing Windows NT Systems


E. Eugene Schultz - Global Integrity
03/05/1999

Windows NT Security-Related Vulnerabilities


E. Eugene Schultz - Global Integrity
02/26/1999

The Windows NT Security Model & Architecture


E. Eugene Schultz - Global Integrity
02/12/1999

Windows 98 and Windows NT Security


Chuck Dircks - Pinnacle Technology
02/05/1999

Practical Security Solutions Using Smartcards


Naomaru Itoi and James Rees - CITIUniversity of Michigan
01/29/1999

Anonymity and cryptographic protocols


Mikhail Atallah - CERIAS /Purdue CS Department
01/22/1999

A Survey of intrusion detection research at the IBM Zurich Research Laboratory


Marc Dacier - IBM Global Security Laboratory
12/04/1998

Conducting Searches in a Computer Environment


Douglas A. Schmidtknecht - FBI Computer Crime Lab
11/13/1998

Security at HP


Dipankur Gupta - HP
11/06/1998

Secure Application Design


Danny Smith - Sun Microsystems
10/30/1998

AXENT Tools For Enterprise Wide Security


James A. Burdick - SNC
10/23/1998

The FBI's Computer Crime Initiatives


Jim Casey - FBI
10/16/1998

WATCHERS: A Protocol to Detect Disruptive Routers


Nick Puketza - UC Davis

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information