The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #308
01/11/2006
Cross-Drive Forensic Analysis

Cross-Drive Forensic Analysis

Simson Garfinkel - Harvard University

Episode #309
01/18/2006
Net Trust:  Identification Through Social Context

Net Trust: Identification Through Social Context

Jean Camp - Indiana University

Episode #310
01/25/2006
Semantic Attacks and Security

Semantic Attacks and Security

Paul Thompson - Dartmouth College

Episode #311
02/01/2006
Digital Identity Management and Theft Protection

Digital Identity Management and Theft Protection

Abhilasha Bhargav-Spantzel - Purdue University

Episode #312
02/08/2006
Categories of Digital Forensic Investigation Techniques

Categories of Digital Forensic Investigation Techniques

Brian Carrier - Purdue University

Episode #313
02/15/2006
Provable security in mobile ad hoc networks

Provable security in mobile ad hoc networks

Mike Burmester - Florida State

Episode #315
03/01/2006
A Policy Engineering Framework for Federated Access Management

A Policy Engineering Framework for Federated Access Management

Rafae Bhatti - Purdue University

Episode #316
03/08/2006
Dynamic and Efficient Key Management for Access Hierarchies

Dynamic and Efficient Key Management for Access Hierarchies

Marina Blanton - Purdue University

Episode #317
03/22/2006
Privacy Policies in Web-based Healthcare

Privacy Policies in Web-based Healthcare

Julie Earp - North Carolina State University

Episode #318
03/29/2006
Spoofing-resistant Packet Routing for the Internet"

Spoofing-resistant Packet Routing for the Internet"

Minaxi Gupta - Indiana University

Episode #319
04/05/2006
Chaos,Complexity, Cybernetics and Therminator:

Chaos,Complexity, Cybernetics and Therminator:

Dave Ford - Naval Postgraduate School

Episode #320
04/12/2006
Identity Management Strategies and Integration Perspectives

Identity Management Strategies and Integration Perspectives

David Carroll - MITRE

Episode #321
04/19/2006
Recent Attacks on MD5

Recent Attacks on MD5

John Black - University of Colorado at Boulder

Episode #322
04/26/2006
On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks

On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks

Virgil D. Gligor - University of Maryland

Episode #323
08/23/2006
Toward Autonomic Security Policy Management

Toward Autonomic Security Policy Management

Ehab Al-Shaer, Ph.D. - DePaul University, Chicago, IL

Episode #324
08/30/2006
Invasive Browser Sniffing and Countermeasures

Invasive Browser Sniffing and Countermeasures

Sid Stamm - Indiana University

Episode #325
09/06/2006
A Multi-layered Approach to Web Application Defense

A Multi-layered Approach to Web Application Defense

Ed Finkler - Purdue University

Episode #326
09/13/2006
Real-Time Visualization of Network Attacks on High-Speed Links

Real-Time Visualization of Network Attacks on High-Speed Links

Hyogon Kim - Korea University/PU Visitor

Episode #327
09/20/2006
Prioritizing Processes and Controls for Effective and Measurable Security

Prioritizing Processes and Controls for Effective and Measurable Security

Gene Kim - Tripwire, Inc

Episode #328
09/27/2006
The Secure Information Sharing Problem and Solution Approaches

The Secure Information Sharing Problem and Solution Approaches

Ravi Sandhu - George Mason University

Episode #329
10/04/2006
Verification of Integrity for Outsourced Content Publishing and Database Queries

Verification of Integrity for Outsourced Content Publishing and Database Queries

Danfeng Yao - Brown University

Episode #330
10/11/2006
Network Security Begins at Home: Changing Consumer Behavior for i-Safety

Network Security Begins at Home: Changing Consumer Behavior for i-Safety

Nora Rifon - Michigan State University

Episode #332
10/25/2006
Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies

Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies

Qihua Wang - Purdue University

Episode #333
11/01/2006
Developing an Operational Framework for Integrated System Security

Developing an Operational Framework for Integrated System Security

Paula DeWitte - St. Mary’s Law School in San Antonio

Episode #336
11/29/2006
OS-Level Taint Analysis for Malware Investigation and Defense

OS-Level Taint Analysis for Malware Investigation and Defense

Dongyan Xu - Purdue University

Episode #337
12/06/2006
The Psychology of Computer Deviance: How it can assist in digital evidence analysis.

The Psychology of Computer Deviance: How it can assist in digital evidence analysis.

Marc Rogers - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!