Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
On Detecting Service Violations in QoS Network Domains
Sonia Fahmy - Department of Computer Science, Purdue University
Privacy Preserving Data Mining
Chris Clifton and Jaideep Vaidya - Department of Computer Science, Purdue University
Generalized Temporal Role-Based Access Control Model
Arif Ghafoor - Electrical and Computer Engineering, Purdue University
Community on the Internet: The Ethics of Interaction
Andrew Feenberg - San Diego State University
Femtosecond Optical Signal Processing: Research Towards Optical Encryption at 100 Gb/s
Andrew Weiner - Purdue University
A Fast Encryption Algorithm, Tame Transformation Method (TTM), with Signature and Master Key functions
Tzuong-Tsieng Moh - Purdue University Department of Mathematics
Information Security & Industrial Relations
Carl Botan - Purdue University Dept. of Communication
Reference Models for Network Origin Concealment and Identification
Tom Daniels - Iowa State University
Machines Reasoning about Machines
J Strother Moore - Department of Computer Sciences, University of Texas at Austin
Intruder Identification in Mobile Ad Hoc Networks
Bharat Bhargava - CERIAS Security Center and Computer Science Department, Purdue UniversityPurdue University
Ways to Watch
