Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/12/2005

Survivable routing in wireless ad hoc networks

Survivable routing in wireless ad hoc networks


Cristina Nita-Rotaru - Purdue University
(220.5MB): Video Icon MP4 Video   Watch on Youtube
01/19/2005

Hidden Access Control Policies with Hidden Credentials

Hidden Access Control Policies with Hidden Credentials


Keith Frikken - Purdue University
(204.5MB): Video Icon MP4 Video   Watch on Youtube
01/26/2005

Self Healing Cyber Databases Under Malicious Attacks


Peng Liu - Pennsylvania State
02/02/2005

Obfuscated Databases: Definitions and Constructions

Obfuscated Databases: Definitions and Constructions


Vitaly Shmatikov - University of Texas at Austin
(220.4MB): Video Icon MP4 Video   Watch on Youtube
02/09/2005

Architectural Considerations for Anomaly Detection

Architectural Considerations for Anomaly Detection


Wenke Lee - Georgia Tech
(122.7MB): Video Icon MP4 Video   Watch on Youtube
02/23/2005

Perturbation of Multivariable Public-key Cryptosystems

Perturbation of Multivariable Public-key Cryptosystems


Jintai Ding - University of Cincinnati
(182.0MB): Video Icon MP4 Video   Watch on Youtube
03/02/2005

Using process labels to obtain forensic and traceback information

Using process labels to obtain forensic and traceback information


Florian Buchholz - Purdue University
(220.4MB): Video Icon MP4 Video   Watch on Youtube
03/09/2005

Where's the FEEB? Effectiveness of Instruction Set Randomization

Where's the FEEB? Effectiveness of Instruction Set Randomization


David Evans - University of Virginia
(142.1MB): Video Icon MP4 Video   Watch on Youtube
03/23/2005

Lockheed Martin

Lockheed Martin


Dr. Kate Cherry and Dr. Wendy Hamilton - Lockheed Martin
(219.9MB): Video Icon MP4 Video   Watch on Youtube
03/30/2005

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks


Helen J. Wang - Microsoft Research
(214.5MB): Video Icon MP4 Video   Watch on Youtube
04/06/2005

Defining a Digital Forensic Investigation

Defining a Digital Forensic Investigation


Brian Carrier - Purdue University
(170.8MB): Video Icon MP4 Video   Watch on Youtube
04/13/2005

Watermarking Relational Databases

Watermarking Relational Databases


Mohamed Shehab - Purdue University
(130.8MB): Video Icon MP4 Video   Watch on Youtube
04/20/2005

Traust and PeerTrust2:  Applying Trust Negotiation to Real Systems

Traust and PeerTrust2: Applying Trust Negotiation to Real Systems


Marianne Winslett - University of Illinois at Urbana-Champaign
(156.4MB): Video Icon MP4 Video   Watch on Youtube
04/27/2005

PrivacyEnhancing k-Anonymization of Customer Data

PrivacyEnhancing k-Anonymization of Customer Data


Sheng Zhong - SUNY at Buffalo
(218.2MB): Video Icon MP4 Video  
08/24/2005

An Introduction to Biometric Technologies

An Introduction to Biometric Technologies


Stephen Elliott - Purdue University
(220.3MB): Video Icon MP4 Video   Watch on Youtube
08/31/2005

Minimizing Trust Liabilities in Secure Group Messaging  Infrastructures

Minimizing Trust Liabilities in Secure Group Messaging Infrastructures


Himanshu Khurana - University of Illinois at Urbana-Champaign
(93.0MB): Video Icon MP4 Video   Watch on Youtube
09/07/2005

Real World Web Application Security

Real World Web Application Security


Ed Finkler - CERIAS, Purdue University
(124.0MB): Video Icon MP4 Video   Watch on Youtube
09/14/2005

Toward Hazard Aware Spaces:  Knowing Where, When and What Hazards Occur

Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur


Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)
(211.7MB): Video Icon MP4 Video   Watch on Youtube
09/21/2005

A Framework for Identifying Compromised Nodes in Sensor Networks

A Framework for Identifying Compromised Nodes in Sensor Networks


Ting Yu - North Carolina State University
(183.1MB): Video Icon MP4 Video   Watch on Youtube
09/28/2005

Managing Risk of Information Systems Security Incidents


Dr. Fariborz Farahmand - Purdue University/CERIAS
10/05/2005

Securing the Internet's Domain Name System

Securing the Internet's Domain Name System


Dan Massey - Colorado State University
(102.6MB): Video Icon MP4 Video   Watch on Youtube
10/12/2005

Aligning Privacy Values, Policies, Law and Software Requirements


Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org
10/19/2005

Toward Self-healing Software

Toward Self-healing Software


Dr. Angelos D. Keromytis - Columbia
(204.1MB): Video Icon MP4 Video   Watch on Youtube
10/26/2005

A Demonstration in the Need for a Layered Security Model

A Demonstration in the Need for a Layered Security Model


Bryant G. Tow - Unisys
(219.2MB): Video Icon MP4 Video   Watch on Youtube
11/09/2005

Privacy and anonymity in Trust Negotiations

Privacy and anonymity in Trust Negotiations".


Anna Squicciarini - University of Milano
(220.7MB): Video Icon MP4 Video   Watch on Youtube
11/16/2005

Privacy-preserving Policy-driven Access Control with Mixed Credentials

Privacy-preserving Policy-driven Access Control with Mixed Credentials


Shouhuai Xu - University of Texas at San Antonio
(105.9MB): Video Icon MP4 Video   Watch on Youtube
11/30/2005

Secret Handshakes

Secret Handshakes


Stanislaw Jarecki - University of California at Irvine
(154.4MB): Video Icon MP4 Video   Watch on Youtube
12/07/2005

Clouseau: A practical IP spoofing defense through route-based filtering

Clouseau: A practical IP spoofing defense through route-based filtering


Jelena Mirkovic - University of Delaware
(133.0MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information