The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/12/2005
Survivable routing in wireless ad hoc networks

Survivable routing in wireless ad hoc networks

Cristina Nita-Rotaru - Purdue University

01/19/2005
Hidden Access Control Policies with Hidden Credentials

Hidden Access Control Policies with Hidden Credentials

Keith Frikken - Purdue University

01/26/2005

Self Healing Cyber Databases Under Malicious Attacks

Peng Liu - Pennsylvania State

02/02/2005
Obfuscated Databases: Definitions and Constructions

Obfuscated Databases: Definitions and Constructions

Vitaly Shmatikov - University of Texas at Austin

02/09/2005
Architectural Considerations for Anomaly Detection

Architectural Considerations for Anomaly Detection

Wenke Lee - Georgia Tech

02/23/2005
Perturbation of Multivariable Public-key Cryptosystems

Perturbation of Multivariable Public-key Cryptosystems

Jintai Ding - University of Cincinnati

03/02/2005
Using process labels to obtain forensic and traceback information

Using process labels to obtain forensic and traceback information

Florian Buchholz - Purdue University

03/09/2005
Where's the FEEB? Effectiveness of Instruction Set Randomization

Where's the FEEB? Effectiveness of Instruction Set Randomization

David Evans - University of Virginia

03/23/2005
Lockheed Martin

Lockheed Martin

Dr. Kate Cherry and Dr. Wendy Hamilton - Lockheed Martin

04/06/2005
Defining a Digital Forensic Investigation

Defining a Digital Forensic Investigation

Brian Carrier - Purdue University

04/13/2005
Watermarking Relational Databases

Watermarking Relational Databases

Mohamed Shehab - Purdue University

04/20/2005
Traust and PeerTrust2:  Applying Trust Negotiation to Real Systems

Traust and PeerTrust2: Applying Trust Negotiation to Real Systems

Marianne Winslett - University of Illinois at Urbana-Champaign

04/27/2005
PrivacyEnhancing k-Anonymization of Customer Data

PrivacyEnhancing k-Anonymization of Customer Data

Sheng Zhong - SUNY at Buffalo

08/24/2005
An Introduction to Biometric Technologies

An Introduction to Biometric Technologies

Stephen Elliott - Purdue University

08/31/2005
Minimizing Trust Liabilities in Secure Group Messaging  Infrastructures

Minimizing Trust Liabilities in Secure Group Messaging Infrastructures

Himanshu Khurana - University of Illinois at Urbana-Champaign

09/07/2005
Real World Web Application Security

Real World Web Application Security

Ed Finkler - CERIAS, Purdue University

09/14/2005
Toward Hazard Aware Spaces:  Knowing Where, When and What Hazards Occur

Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur

Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)

09/21/2005
A Framework for Identifying Compromised Nodes in Sensor Networks

A Framework for Identifying Compromised Nodes in Sensor Networks

Ting Yu - North Carolina State University

09/28/2005

Managing Risk of Information Systems Security Incidents

Dr. Fariborz Farahmand - Purdue University/CERIAS

10/05/2005
Securing the Internet's Domain Name System

Securing the Internet's Domain Name System

Dan Massey - Colorado State University

10/12/2005

Aligning Privacy Values, Policies, Law and Software Requirements

Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org

10/19/2005
Toward Self-healing Software

Toward Self-healing Software

Dr. Angelos D. Keromytis - Columbia

11/09/2005
Privacy and anonymity in Trust Negotiations".

Privacy and anonymity in Trust Negotiations".

Anna Squicciarini - University of Milano

11/16/2005
Privacy-preserving Policy-driven Access Control with Mixed Credentials

Privacy-preserving Policy-driven Access Control with Mixed Credentials

Shouhuai Xu - University of Texas at San Antonio

11/30/2005
Secret Handshakes

Secret Handshakes

Stanislaw Jarecki - University of California at Irvine

12/07/2005
Clouseau: A practical IP spoofing defense through route-based filtering

Clouseau: A practical IP spoofing defense through route-based filtering

Jelena Mirkovic - University of Delaware

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!