Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 701 to 725 of 887Affiliation shown is the affiliation at the time the talk was given.
Extensible Security Services On The CROSS Software-Programmable Router
David Yau - Purdue University Computer Science
Information Policy In The Post-Attack Age
Lance Hoffman - School of Engineering and Applied Science, George Washington University
The Forgotten Information Assurance Professional - Educating the Senior IT Manager
Robert Norris - National Defense University
An IT Safety Index: Measuring Capabilities for Repeatable Builds and Remediation
Gene Kim - Tripwire
Secure Knowledge Management Portal
Joseph M. Silcox - Raytheon Command, Control, and Communications Systems
Towards a Coherent Definition of Cybercrime: A Philosophical Analysis
Herman Tavani - Rivier College
Practical Quantum Cryptography: A Comprehensive Analysis
Gerald Gilbert - Mitre Corporation
NL as Encryption for Meaning and its Uses for InfoSec
Sergei Nirenburg - Purdue University Computer Science
How to Choose, and How Not to Choose, Large Primes For Use in Cryptography
Samuel Wagstaff Jr. - CERIAS
Why is IT in so much pain? Parallels of modern server security to 1700 maritime navigation.
Gene Kim - Tripwire
Distributed DoS Attack Prevention using Route-Based Distributed Packet Filtering
Heejo Lee - CERIAS