The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 651 to 675 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #286
03/09/2005
Where's the FEEB? Effectiveness of Instruction Set Randomization

Where's the FEEB? Effectiveness of Instruction Set Randomization

David Evans - University of Virginia

Episode #285
03/02/2005
Using process labels to obtain forensic and traceback information

Using process labels to obtain forensic and traceback information

Florian Buchholz - Purdue University

Episode #284
02/23/2005
Perturbation of Multivariable Public-key Cryptosystems

Perturbation of Multivariable Public-key Cryptosystems

Jintai Ding - University of Cincinnati

Episode #282
02/09/2005
Architectural Considerations for Anomaly Detection

Architectural Considerations for Anomaly Detection

Wenke Lee - Georgia Tech

Episode #281
02/02/2005
Obfuscated Databases: Definitions and Constructions

Obfuscated Databases: Definitions and Constructions

Vitaly Shmatikov - University of Texas at Austin

Episode #280
01/26/2005

Self Healing Cyber Databases Under Malicious Attacks

Peng Liu - Pennsylvania State

Episode #279
01/19/2005
Hidden Access Control Policies with Hidden Credentials

Hidden Access Control Policies with Hidden Credentials

Keith Frikken - Purdue University

Episode #278
01/12/2005
Survivable routing in wireless ad hoc networks

Survivable routing in wireless ad hoc networks

Cristina Nita-Rotaru - Purdue University

Episode #277
12/08/2004
Using Statistical Analysis to Locate Spam Web Pages

Using Statistical Analysis to Locate Spam Web Pages

Dennis Fetterly - Microsoft

Episode #276
12/01/2004
Attribute-Based Access Control

Attribute-Based Access Control

William Winsborough - George Mason University

Episode #275
11/17/2004
An Anonymous Fair-Exchange E-Commerce Protocol

An Anonymous Fair-Exchange E-Commerce Protocol

Indrakshi Ray - Colorado State University

Episode #274
11/10/2004
GTRBAC: A Generalized Temporal Role Based Access Control Model

GTRBAC: A Generalized Temporal Role Based Access Control Model

James Joshi - Pittsburgh University

Episode #273
11/03/2004
Towards Mining Syslog Data

Towards Mining Syslog Data

Abe Singer - University of California at San Diego

Episode #272
10/27/2004
Robustness testing - black-box testing for software security

Robustness testing - black-box testing for software security

Ari Takanen - Codenomicon Ltd.

Episode #271
10/20/2004

Effective and Efficient Intrusion Analysis

Peng Ning - NC State

Episode #270
10/13/2004
Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux

Dan Thomsen - Tresys Technology

Episode #269
10/06/2004

How to Forge Signatures and Be Happy About It

Giuseppe Ateniese - Johns Hopkins University

Episode #268
09/29/2004

Automatic Generation and Analysis of Attack Graphs

Jeannette Wing - Carnegie Mellon University

Episode #267
09/22/2004

Samuel D. Conte Distinguished Lecture Series

John Mitchell - Stanford University

Episode #266
09/15/2004
Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment

Gail-Joon Ahn - University of North Carolina at Charlotte

Episode #265
09/08/2004
Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration

Jason Crampton - Royal Holloway, University of London

Episode #264
09/01/2004

Privacy Technologies

Latanya Sweeney - Carnegie Mellon University

Episode #263
08/25/2004
Application of Thermodynamics to Computer Network Defense

Application of Thermodynamics to Computer Network Defense

Dave Ford - Naval Postgraduate School

Episode #262
04/28/2004

Retrofitting Security to Internet Infrastructure Protocols

Russ Mundy - Sparta

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!