Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/15/2003

OpenTrusted Computing: Big Brother Inside?


Stefek Zaba - HPLabs Trusted Computing Lab
01/22/2003

Identifier-Based Encryption


Keith Harrison - HP Trusted Computing Lab
02/05/2003

Cryptographic mistakes you should avoid


Samuel S. Wagstaff, Jr. - CERIAS
02/12/2003

PRIMES is in P


Samuel S. Wagstaff, Jr. - CERIAS
02/19/2003

International Coordination to Increase the Security of Critical Network


Dr. Seymour E. Goodman - Georgia Institute of Technology
03/05/2003

Computational Number Theory and Cryptography


Andreas Stein - UIUC Math Department
03/12/2003

Solid Software: Is it Rocket Science?


Shari Lawrence Pfleeger, PhD - RAND
03/26/2003

Security Seminar


Mark McGovern - In-Q-Tel
04/09/2003

4th Annual CERIAS Research Symposium


CERIAS Research Symposium Roundtable Discussion
04/16/2003

ESP and Poly^2: Challenging the Conventional Wisdom


Eugene H. Spafford - CERIAS
04/30/2003

Tech 2 CTO 2 Entreprenuer


Rebecca Hendricks - Mirror Consulting, Inc.
08/27/2003

Relating Software Engineering and Information Security


Gene Spafford - Purdue University
09/03/2003

Oblivious Signature-Based Envelope


Prof. Ninghui Li - Purdue University
09/10/2003

The Psychology of Hackers & Virus Writers


Marc Rogers - Purdue University
09/17/2003

The Policy Machine: Towards Universal Attribute-based Access Control Policy Specification and Enforcement


David F. Ferraiolo - National Institute of Standards and Technology
09/24/2003

Automated Trust Negotiation:


Prof. Marianne Winslett - University of Illinois at Urbana-Champaign
10/01/2003

Economic Analysis of the Market for software vulnerability disclosure


Karthik Kannan - Krannert School of Management, Purdue University
10/08/2003

Specification and Management of Attribute-based Authorization Policy


Dr. William H. Winsborough - George Mason University
10/22/2003

Privacy-Preserving Online Collaborations


Mikhail Atallah - Purdue University
10/29/2003

An End-To-End Approach to Digital Investigation


Peter Stephenson - International Institute for Digital Forensic Studies
11/05/2003

Semantic Mimicking: Creating Nonsense with Sense


Krista Bennett - Purdue University
11/12/2003

Port Scans: Real Numbers, Real Networks


Carrie Gates - Carnegie Mellon University
11/19/2003

Natural Language Watermarking and Tamperproofing


Katrina E. Triezenberg - PhD Candidate, Purdue University
12/03/2003

Using Criminal Law to Encourage the Prevention of Cybercrime


Susan Brenner - University of Dayton School of Law
12/10/2003

NL Downgrading, Sanitization, and Declassification


Dina Mohamed - Purdue University Department of Linguistics

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information