CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 76 to 100 of 699
04/13/2016

Privacy-preserving payments in credit networks

Privacy-preserving payments in credit networks


Pedro Moreno Sanchez - Purdue University
(137.5MB): Video Icon MP4 Video   Watch on Youtube
03/23/2016

Usable Secure Webmail for Grassroots Adoption

Usable Secure Webmail for Grassroots Adoption


Kent Seamons - Brigham Young University
(165.2MB): Video Icon MP4 Video   Watch on Youtube
03/09/2016

Batch Techniques for Practical Private Information Retrieval

Batch Techniques for Practical Private Information Retrieval


Ryan Henry - Indiana University
(365.6MB): Video Icon MP4 Video   Watch on Youtube
03/02/2016

Context Aware, Policy based approaches to Security

Context Aware, Policy based approaches to Security


Anupam Joshi - University of Maryland, Baltimore County
(229.0MB): Video Icon MP4 Video   Watch on Youtube
02/24/2016

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule


Xukai Zou - Indiana University-Purdue University Indianapolis
(201.8MB): Video Icon MP4 Video   Watch on Youtube
02/17/2016

Predicting What Users Will do Next

Predicting What Users Will do Next


Bruno Ribeiro - Purdue University
(99.3MB): Video Icon MP4 Video   Watch on Youtube
02/10/2016

IN-ISAC: SOC, Security Awareness and More

IN-ISAC: SOC, Security Awareness and More


Nicholas Sturgeon - Indiana Office of Technology
(182.7MB): Video Icon MP4 Video   Watch on Youtube
02/03/2016

Robust Secure Computation

Robust Secure Computation


Hemanta Maji - Purdue University
(123.7MB): Video Icon MP4 Video   Watch on Youtube
01/27/2016

Big Data Security and Privacy

Big Data Security and Privacy


Elisa Bertino - Purdue University
(235.6MB): Video Icon MP4 Video   Watch on Youtube
01/20/2016

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box


Chris Clifton - Purdue University
(151.5MB): Video Icon MP4 Video   Watch on Youtube
01/13/2016

Microsemi Security Solutions and Threat Driven Security

Microsemi Security Solutions and Threat Driven Security


Jim Gallagher - Microsemi
(174.0MB): Video Icon MP4 Video   Watch on Youtube
12/09/2015

 Preventing or Penalizing Equivocation in Decentralized Environments

Preventing or Penalizing Equivocation in Decentralized Environments


Aniket Kate - Purdue University
(116.1MB): Video Icon MP4 Video   Watch on Youtube
11/18/2015

 A Secure Communication Protocol for Drones and Smart Objects

A Secure Communication Protocol for Drones and Smart Objects


Jongho Won - Purdue University
(88.2MB): Video Icon MP4 Video   Watch on Youtube
11/11/2015

Verifying Computations with (Private) State

Verifying Computations with (Private) State


Ariel Feldman - University of Chicago
(138.7MB): Video Icon MP4 Video   Watch on Youtube
11/04/2015

Secure Multiparty Computation and Differential Privacy

Secure Multiparty Computation and Differential Privacy


Balamurugan Anandan - Purdue University
(125.4MB): Video Icon MP4 Video   Watch on Youtube
10/28/2015

 Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama


Kate Seigfried-Spellar - Purdue University
(213.2MB): Video Icon MP4 Video   Watch on Youtube
10/21/2015

Anonymized Data

Anonymized Data


Koray Mancuhan - Purdue University
(94.6MB): Video Icon MP4 Video   Watch on Youtube
09/16/2015

Evaluation of Urban Vehicle Tracking Algorithms

Evaluation of Urban Vehicle Tracking Algorithms


John Feddema - Sandia Labs
(0): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.