The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #71
01/16/1998

US Government Perspective on Information Security

Chris Shutters - National Security Agency

Episode #72
01/23/1998

Some Thoughts on Security Vulnerability Classification

Ivan Krsul - CERIAS

Episode #73
01/30/1998

The status of some cryptographic hash functions

Mahesh Tripunitara - CERIAS

Episode #74
02/06/1998

Some Observations About Audit Trails

Chapman Flack and Diego Zamboni - Purdue University

Episode #75
02/13/1998

The Nature of Biometrics

Rich Forkert - NBS Imaging Systems

Episode #77
03/20/1998

A survey of cryptographic protocols

Mikhail Atallah - CERIAS /Purdue CS Department

Episode #78
03/27/1998

Web Certifications: The Good, the Bad, and the Ugly

Steve Lodin - Ernst & Young Information Security Services

Episode #79
04/03/1998

Connected, Wired, ... and Sued

Wiliam J. Cook

Episode #80
04/10/1998

Safety and Privacy on the Internet

Jorian Clarke - SpectraCom

Episode #81
04/17/1998

The MITRE Network Security Assessment Toolkit

Daniel Vukelich - MITRE Corporation"

Episode #82
04/21/1998

Intelligence Requirements for Information Warfare: an Initial Assessment

Lorenzo Valeri - King's College

Episode #83
04/23/1998

Internet Growth Issues in Operations

J. F. Mergen - GTE Internetworking

Episode #84
04/24/1998

Theft of Information and Conspiracy in the Take-Grant Protection Model

Matt Bishop - U.C. Davis

Episode #85
05/01/1998

Building a High-Performance, Programmable Secure Coprocessor

Sean W. Smith - IBM T.J. Watson Research Center

Episode #86
08/28/1998

Distributed monitoring and intrusion detection using autonomous agents

Diego Zamboni - Purdue COAST

Episode #87
09/04/1998

Trusted Operating Systems in Web-based Computing

Paul McNabb - Argus Systems Group, Inc.

Episode #88
09/11/1998

The New Environment & Risk Assessments

Caroline R. Hamilton - Risk Watch

Episode #89
09/18/1998

Multilingual Information Processing at NMSU CRL: Problems, Technologies, Applications, Tools and Resources

Sergei Nirenburg - Computing Research Laboratory, New Mexico State University

Episode #90
09/25/1998

Infrastructure Assurance - The Challenge of the Next Millennium

William Harris - U.S. Critical Infrastructure Assurance Office

Episode #91
10/02/1998

Information Security Consulting

John Clark - Andersen Consulting

Episode #92
10/09/1998

Information Security Consulting Wargaming Cyber-terrorism in SEAS

Alok R. Chaturvedi - Management, Purdue University

Episode #93
10/16/1998

WATCHERS: A Protocol to Detect Disruptive Routers

Nick Puketza - UC Davis

Episode #94
10/23/1998

The FBI's Computer Crime Initiatives

Jim Casey - FBI

Episode #95
10/30/1998

AXENT Tools For Enterprise Wide Security

James A. Burdick - SNC

Episode #96
11/06/1998

Secure Application Design

Danny Smith - Sun Microsystems

Episode #97
11/13/1998

Security at HP

Dipankur Gupta - HP

Episode #98
11/20/1998

Lessons Learned in the Implementation of a Multi-Location Network Based Real-Time Intrusion System

Michael Puldy - IBM Emergency Response Service

Episode #99
12/04/1998

Conducting Searches in a Computer Environment

Douglas A. Schmidtknecht - FBI Computer Crime Lab

Episode #100
12/11/1998

Smart Cards and Biometrics: Your Key to PKI

David P. Sims - Schlumberger

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!