The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 651 to 675 of 879

Affiliation shown is the affiliation at the time the talk was given.

03/05/2003

Computational Number Theory and Cryptography

Andreas Stein - UIUC Math Department

02/19/2003

International Coordination to Increase the Security of Critical Network

Dr. Seymour E. Goodman - Georgia Institute of Technology

02/12/2003

PRIMES is in P

Samuel S. Wagstaff, Jr. - CERIAS

02/05/2003

Cryptographic mistakes you should avoid

Samuel S. Wagstaff, Jr. - CERIAS

01/22/2003

Identifier-Based Encryption

Keith Harrison - HP Trusted Computing Lab

01/15/2003

OpenTrusted Computing: Big Brother Inside?

Stefek Zaba - HPLabs Trusted Computing Lab

12/04/2002

Security Seminar

Steve Crutchley - 4FrontSecurity Inc.

11/20/2002

Security Seminar

11/13/2002

Security Seminar

11/06/2002

Intruder Identification in Mobile Ad Hoc Networks

Bharat Bhargava - CERIAS Security Center and Computer Science Department, Purdue UniversityPurdue University

10/30/2002

Machines Reasoning about Machines

J Strother Moore - Department of Computer Sciences, University of Texas at Austin

10/23/2002

Lessons From The History of Computer Security

Bob Abbott - Consultant

10/16/2002

Security Seminar

10/09/2002

Security Seminar

Walid Aref - Purdue University Dept. of Computer Sciences

10/02/2002

Reference Models for Network Origin Concealment and Identification

Tom Daniels - Iowa State University

09/18/2002

Natural Language Sanitizing/Downgrading

Victor Raskin - Purdue University

09/11/2002

Information Security & Industrial Relations

Carl Botan - Purdue University Dept. of Communication

09/04/2002

A Fast Encryption Algorithm, Tame Transformation Method (TTM), with Signature and Master Key functions

Tzuong-Tsieng Moh - Purdue University Department of Mathematics

08/28/2002

Data mining technology

Chris Clifton - Department of Computer Science, Purdue University

04/19/2002

Community on the Internet: The Ethics of Interaction

Andrew Feenberg - San Diego State University

04/17/2002

A Vulnerability Management Maturity Mode

Mike Berard - eSecurityOnline

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!