Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 626 to 650 of 716
10/02/1998

Information Security Consulting


John Clark - Andersen Consulting
09/11/1998

The New Environment & Risk Assessments


Caroline R. Hamilton - Risk Watch
05/01/1998

Building a High-Performance, Programmable Secure Coprocessor


Sean W. Smith - IBM T.J. Watson Research Center
04/23/1998

Internet Growth Issues in Operations


J. F. Mergen - GTE Internetworking
04/03/1998

Connected, Wired, ... and Sued


Wiliam J. Cook
03/27/1998

Web Certifications: The Good, the Bad, and the Ugly


Steve Lodin - Ernst & Young Information Security Services
03/20/1998

A survey of cryptographic protocols


Mikhail Atallah - CERIAS /Purdue CS Department
02/13/1998

The Nature of Biometrics


Rich Forkert - NBS Imaging Systems
02/06/1998

Some Observations About Audit Trails


Chapman Flack and Diego Zamboni - Purdue University
01/30/1998

The status of some cryptographic hash functions


Mahesh Tripunitara - CERIAS
12/12/1997

An Architecture for ATM Network Security


Kihong Park - Purdue University
11/14/1997

Open Discussion


Gene Spafford - Purdue University

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information