The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 626 to 650 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #311
02/01/2006
Digital Identity Management and Theft Protection

Digital Identity Management and Theft Protection

Abhilasha Bhargav-Spantzel - Purdue University

Episode #310
01/25/2006
Semantic Attacks and Security

Semantic Attacks and Security

Paul Thompson - Dartmouth College

Episode #309
01/18/2006
Net Trust:  Identification Through Social Context

Net Trust: Identification Through Social Context

Jean Camp - Indiana University

Episode #308
01/11/2006
Cross-Drive Forensic Analysis

Cross-Drive Forensic Analysis

Simson Garfinkel - Harvard University

Episode #307
12/07/2005
Clouseau: A practical IP spoofing defense through route-based filtering

Clouseau: A practical IP spoofing defense through route-based filtering

Jelena Mirkovic - University of Delaware

Episode #306
11/30/2005
Secret Handshakes

Secret Handshakes

Stanislaw Jarecki - University of California at Irvine

Episode #305
11/16/2005
Privacy-preserving Policy-driven Access Control with Mixed Credentials

Privacy-preserving Policy-driven Access Control with Mixed Credentials

Shouhuai Xu - University of Texas at San Antonio

Episode #304
11/09/2005
Privacy and anonymity in Trust Negotiations".

Privacy and anonymity in Trust Negotiations".

Anna Squicciarini - University of Milano

Episode #303
11/02/2005

The Ontology of Documents and the Technology of Identification

Barry Smith - SUNY Buffalo

Episode #302
10/26/2005
A Demonstration in the Need for a Layered Security Model

A Demonstration in the Need for a Layered Security Model

Bryant G. Tow - Unisys

Episode #301
10/19/2005
Toward Self-healing Software

Toward Self-healing Software

Dr. Angelos D. Keromytis - Columbia

Episode #300
10/12/2005

Aligning Privacy Values, Policies, Law and Software Requirements

Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org

Episode #299
10/05/2005
Securing the Internet's Domain Name System

Securing the Internet's Domain Name System

Dan Massey - Colorado State University

Episode #298
09/28/2005

Managing Risk of Information Systems Security Incidents

Dr. Fariborz Farahmand - Purdue University/CERIAS

Episode #297
09/21/2005
A Framework for Identifying Compromised Nodes in Sensor Networks

A Framework for Identifying Compromised Nodes in Sensor Networks

Ting Yu - North Carolina State University

Episode #296
09/14/2005
Toward Hazard Aware Spaces:  Knowing Where, When and What Hazards Occur

Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur

Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)

Episode #295
09/07/2005
Real World Web Application Security

Real World Web Application Security

Ed Finkler - CERIAS, Purdue University

Episode #294
08/31/2005
Minimizing Trust Liabilities in Secure Group Messaging  Infrastructures

Minimizing Trust Liabilities in Secure Group Messaging Infrastructures

Himanshu Khurana - University of Illinois at Urbana-Champaign

Episode #293
08/24/2005
An Introduction to Biometric Technologies

An Introduction to Biometric Technologies

Stephen Elliott - Purdue University

Episode #292
04/27/2005
PrivacyEnhancing k-Anonymization of Customer Data

PrivacyEnhancing k-Anonymization of Customer Data

Sheng Zhong - SUNY at Buffalo

Episode #291
04/20/2005
Traust and PeerTrust2:  Applying Trust Negotiation to Real Systems

Traust and PeerTrust2: Applying Trust Negotiation to Real Systems

Marianne Winslett - University of Illinois at Urbana-Champaign

Episode #290
04/13/2005
Watermarking Relational Databases

Watermarking Relational Databases

Mohamed Shehab - Purdue University

Episode #289
04/06/2005
Defining a Digital Forensic Investigation

Defining a Digital Forensic Investigation

Brian Carrier - Purdue University

Episode #288
03/30/2005
Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks

Helen J. Wang - Microsoft Research

Episode #287
03/23/2005
Lockheed Martin

Lockheed Martin

Dr. Kate Cherry and Dr. Wendy Hamilton - Lockheed Martin

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!