CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/12/2005

Survivable routing in wireless ad hoc networks

Survivable routing in wireless ad hoc networks


Cristina Nita-Rotaru - Purdue University
(220.5MB): Video Icon MP4 Video   Watch on Youtube
01/19/2005

Hidden Access Control Policies with Hidden Credentials

Hidden Access Control Policies with Hidden Credentials


Keith Frikken - Purdue University
(204.5MB): Video Icon MP4 Video   Watch on Youtube
01/26/2005

Self Healing Cyber Databases Under Malicious Attacks


Peng Liu - Pennsylvania State
02/02/2005

Obfuscated Databases: Definitions and Constructions

Obfuscated Databases: Definitions and Constructions


Vitaly Shmatikov - University of Texas at Austin
(220.4MB): Video Icon MP4 Video   Watch on Youtube
02/09/2005

Architectural Considerations for Anomaly Detection

Architectural Considerations for Anomaly Detection


Wenke Lee - Georgia Tech
(122.7MB): Video Icon MP4 Video   Watch on Youtube
02/23/2005

Perturbation of Multivariable Public-key Cryptosystems

Perturbation of Multivariable Public-key Cryptosystems


Jintai Ding - University of Cincinnati
(182.0MB): Video Icon MP4 Video   Watch on Youtube
03/02/2005

Using process labels to obtain forensic and traceback information

Using process labels to obtain forensic and traceback information


Florian Buchholz - Purdue University
(220.4MB): Video Icon MP4 Video   Watch on Youtube
03/09/2005

Where's the FEEB? Effectiveness of Instruction Set Randomization

Where's the FEEB? Effectiveness of Instruction Set Randomization


David Evans - University of Virginia
(142.1MB): Video Icon MP4 Video   Watch on Youtube
03/23/2005

Lockheed Martin

Lockheed Martin


Dr. Kate Cherry and Dr. Wendy Hamilton - Lockheed Martin
(219.9MB): Video Icon MP4 Video   Watch on Youtube
03/30/2005

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks


Helen J. Wang - Microsoft Research
(214.5MB): Video Icon MP4 Video   Watch on Youtube
04/06/2005

Defining a Digital Forensic Investigation

Defining a Digital Forensic Investigation


Brian Carrier - Purdue University
(170.8MB): Video Icon MP4 Video   Watch on Youtube
04/13/2005

Watermarking Relational Databases

Watermarking Relational Databases


Mohamed Shehab - Purdue University
(130.8MB): Video Icon MP4 Video   Watch on Youtube
04/20/2005

Traust and PeerTrust2:  Applying Trust Negotiation to Real Systems

Traust and PeerTrust2: Applying Trust Negotiation to Real Systems


Marianne Winslett - University of Illinois at Urbana-Champaign
(156.4MB): Video Icon MP4 Video   Watch on Youtube
04/27/2005

PrivacyEnhancing k-Anonymization of Customer Data

PrivacyEnhancing k-Anonymization of Customer Data


Sheng Zhong - SUNY at Buffalo
(218.2MB): Video Icon MP4 Video  
08/24/2005

An Introduction to Biometric Technologies

An Introduction to Biometric Technologies


Stephen Elliott - Purdue University
(220.3MB): Video Icon MP4 Video   Watch on Youtube
08/31/2005

Minimizing Trust Liabilities in Secure Group Messaging  Infrastructures

Minimizing Trust Liabilities in Secure Group Messaging Infrastructures


Himanshu Khurana - University of Illinois at Urbana-Champaign
(93.0MB): Video Icon MP4 Video   Watch on Youtube
09/07/2005

Real World Web Application Security

Real World Web Application Security


Ed Finkler - CERIAS, Purdue University
(124.0MB): Video Icon MP4 Video   Watch on Youtube
09/14/2005

Toward Hazard Aware Spaces:  Knowing Where, When and What Hazards Occur

Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur


Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)
(211.7MB): Video Icon MP4 Video   Watch on Youtube
09/21/2005

A Framework for Identifying Compromised Nodes in Sensor Networks

A Framework for Identifying Compromised Nodes in Sensor Networks


Ting Yu - North Carolina State University
(183.1MB): Video Icon MP4 Video   Watch on Youtube
09/28/2005

Managing Risk of Information Systems Security Incidents


Dr. Fariborz Farahmand - Purdue University/CERIAS
10/05/2005

Securing the Internet's Domain Name System

Securing the Internet's Domain Name System


Dan Massey - Colorado State University
(102.6MB): Video Icon MP4 Video   Watch on Youtube
10/12/2005

Aligning Privacy Values, Policies, Law and Software Requirements


Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org
10/19/2005

Toward Self-healing Software

Toward Self-healing Software


Dr. Angelos D. Keromytis - Columbia
(204.1MB): Video Icon MP4 Video   Watch on Youtube
10/26/2005

A Demonstration in the Need for a Layered Security Model

A Demonstration in the Need for a Layered Security Model


Bryant G. Tow - Unisys
(219.2MB): Video Icon MP4 Video   Watch on Youtube
11/09/2005

Privacy and anonymity in Trust Negotiations

Privacy and anonymity in Trust Negotiations".


Anna Squicciarini - University of Milano
(220.7MB): Video Icon MP4 Video   Watch on Youtube
11/16/2005

Privacy-preserving Policy-driven Access Control with Mixed Credentials

Privacy-preserving Policy-driven Access Control with Mixed Credentials


Shouhuai Xu - University of Texas at San Antonio
(105.9MB): Video Icon MP4 Video   Watch on Youtube
11/30/2005

Secret Handshakes

Secret Handshakes


Stanislaw Jarecki - University of California at Irvine
(154.4MB): Video Icon MP4 Video   Watch on Youtube
12/07/2005

Clouseau: A practical IP spoofing defense through route-based filtering

Clouseau: A practical IP spoofing defense through route-based filtering


Jelena Mirkovic - University of Delaware
(133.0MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.