CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/11/2006

Cross-Drive Forensic Analysis

Cross-Drive Forensic Analysis


Simson Garfinkel - Harvard University
(91.2MB): Video Icon MP4 Video   Watch on Youtube
01/18/2006

Net Trust:  Identification Through Social Context

Net Trust: Identification Through Social Context


Jean Camp - Indiana University
(209.8MB): Video Icon MP4 Video   Watch on Youtube
01/25/2006

Semantic Attacks and Security

Semantic Attacks and Security


Paul Thompson - Dartmouth College
(191.4MB): Video Icon MP4 Video   Watch on Youtube
02/01/2006

Digital Identity Management and Theft Protection

Digital Identity Management and Theft Protection


Abhilasha Bhargav-Spantzel - Purdue University
(208.2MB): Video Icon MP4 Video   Watch on Youtube
02/08/2006

Categories of Digital Forensic Investigation Techniques

Categories of Digital Forensic Investigation Techniques


Brian Carrier - Purdue University
(190.6MB): Video Icon MP4 Video   Watch on Youtube
02/15/2006

Provable security in mobile ad hoc networks

Provable security in mobile ad hoc networks


Mike Burmester - Florida State
(199.5MB): Video Icon MP4 Video   Watch on Youtube
03/01/2006

A Policy Engineering Framework for Federated Access Management

A Policy Engineering Framework for Federated Access Management


Rafae Bhatti - Purdue University
(159.2MB): Video Icon MP4 Video   Watch on Youtube
03/08/2006

Dynamic and Efficient Key Management for Access Hierarchies

Dynamic and Efficient Key Management for Access Hierarchies


Marina Blanton - Purdue University
(147.0MB): Video Icon MP4 Video   Watch on Youtube
03/22/2006

Privacy Policies in Web-based Healthcare

Privacy Policies in Web-based Healthcare


Julie Earp - North Carolina State University
(216.6MB): Video Icon MP4 Video   Watch on Youtube
03/29/2006

Spoofing-resistant Packet Routing for the Internet

Spoofing-resistant Packet Routing for the Internet"


Minaxi Gupta - Indiana University
(215.4MB): Video Icon MP4 Video   Watch on Youtube
04/05/2006

Chaos,Complexity, Cybernetics and Therminator:

Chaos,Complexity, Cybernetics and Therminator:


Dave Ford - Naval Postgraduate School
(216.6MB): Video Icon MP4 Video   Watch on Youtube
04/12/2006

Identity Management Strategies and Integration Perspectives

Identity Management Strategies and Integration Perspectives


David Carroll - MITRE
(201.0MB): Video Icon MP4 Video   Watch on Youtube
04/19/2006

Recent Attacks on MD5

Recent Attacks on MD5


John Black - University of Colorado at Boulder
(137.5MB): Video Icon MP4 Video   Watch on Youtube
08/23/2006

Toward Autonomic Security Policy Management

Toward Autonomic Security Policy Management


Ehab Al-Shaer, Ph.D. - DePaul University, Chicago, IL
(197.1MB): Video Icon MP4 Video   Watch on Youtube
08/30/2006

Invasive Browser Sniffing and Countermeasures

Invasive Browser Sniffing and Countermeasures


Sid Stamm - Indiana University
(234.0MB): Video Icon MP4 Video   Watch on Youtube
09/06/2006

A Multi-layered Approach to Web Application Defense

A Multi-layered Approach to Web Application Defense


Ed Finkler - Purdue University
(170.1MB): Video Icon MP4 Video   Watch on Youtube
09/13/2006

Real-Time Visualization of Network Attacks on High-Speed Links

Real-Time Visualization of Network Attacks on High-Speed Links


Hyogon Kim - Korea University/PU Visitor
(219.7MB): Video Icon MP4 Video   Watch on Youtube
09/27/2006

The Secure Information Sharing Problem and Solution Approaches

The Secure Information Sharing Problem and Solution Approaches


Ravi Sandhu - George Mason University
(218.9MB): Video Icon MP4 Video   Watch on Youtube
10/11/2006

Network Security Begins at Home: Changing Consumer Behavior for i-Safety

Network Security Begins at Home: Changing Consumer Behavior for i-Safety


Nora Rifon - Michigan State University
(218.7MB): Video Icon MP4 Video   Watch on Youtube
11/01/2006

Developing an Operational Framework for Integrated System Security

Developing an Operational Framework for Integrated System Security


Paula DeWitte - St. Mary’s Law School in San Antonio
(219.8MB): Video Icon MP4 Video   Watch on Youtube
11/29/2006

OS-Level Taint Analysis for Malware Investigation and Defense

OS-Level Taint Analysis for Malware Investigation and Defense


Dongyan Xu - Purdue University
(219.5MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.