Archive

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/30/1998

The status of some cryptographic hash functions


Mahesh Tripunitara - CERIAS
02/06/1998

Some Observations About Audit Trails


Chapman Flack and Diego Zamboni - Purdue University
02/13/1998

The Nature of Biometrics


Rich Forkert - NBS Imaging Systems
03/20/1998

A survey of cryptographic protocols


Mikhail Atallah - CERIAS /Purdue CS Department
03/27/1998

Web Certifications: The Good, the Bad, and the Ugly


Steve Lodin - Ernst & Young Information Security Services
04/03/1998

Connected, Wired, ... and Sued


Wiliam J. Cook
04/23/1998

Internet Growth Issues in Operations


J. F. Mergen - GTE Internetworking
05/01/1998

Building a High-Performance, Programmable Secure Coprocessor


Sean W. Smith - IBM T.J. Watson Research Center
09/11/1998

The New Environment & Risk Assessments


Caroline R. Hamilton - Risk Watch
10/02/1998

Information Security Consulting


John Clark - Andersen Consulting
10/09/1998

Information Security Consulting Wargaming Cyber-terrorism in SEAS


Alok R. Chaturvedi - Management, Purdue University
10/16/1998

WATCHERS: A Protocol to Detect Disruptive Routers


Nick Puketza - UC Davis
10/23/1998

The FBI's Computer Crime Initiatives


Jim Casey - FBI
10/30/1998

AXENT Tools For Enterprise Wide Security


James A. Burdick - SNC
11/06/1998

Secure Application Design


Danny Smith - Sun Microsystems
11/13/1998

Security at HP


Dipankur Gupta - HP
12/04/1998

Conducting Searches in a Computer Environment


Douglas A. Schmidtknecht - FBI Computer Crime Lab

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information