Archive

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/11/2006

Cross-Drive Forensic Analysis

Cross-Drive Forensic Analysis


Simson Garfinkel - Harvard University
(91.2MB): Video Icon MP4 Video   Watch on Youtube
01/18/2006

Net Trust:  Identification Through Social Context

Net Trust: Identification Through Social Context


Jean Camp - Indiana University
(209.8MB): Video Icon MP4 Video   Watch on Youtube
01/25/2006

Semantic Attacks and Security

Semantic Attacks and Security


Paul Thompson - Dartmouth College
(191.4MB): Video Icon MP4 Video   Watch on Youtube
02/01/2006

Digital Identity Management and Theft Protection

Digital Identity Management and Theft Protection


Abhilasha Bhargav-Spantzel - Purdue University
(208.2MB): Video Icon MP4 Video   Watch on Youtube
02/08/2006

Categories of Digital Forensic Investigation Techniques

Categories of Digital Forensic Investigation Techniques


Brian Carrier - Purdue University
(190.6MB): Video Icon MP4 Video   Watch on Youtube
02/15/2006

Provable security in mobile ad hoc networks

Provable security in mobile ad hoc networks


Mike Burmester - Florida State
(199.5MB): Video Icon MP4 Video   Watch on Youtube
03/01/2006

A Policy Engineering Framework for Federated Access Management

A Policy Engineering Framework for Federated Access Management


Rafae Bhatti - Purdue University
(159.2MB): Video Icon MP4 Video   Watch on Youtube
03/08/2006

Dynamic and Efficient Key Management for Access Hierarchies

Dynamic and Efficient Key Management for Access Hierarchies


Marina Blanton - Purdue University
(147.0MB): Video Icon MP4 Video   Watch on Youtube
03/22/2006

Privacy Policies in Web-based Healthcare

Privacy Policies in Web-based Healthcare


Julie Earp - North Carolina State University
(216.6MB): Video Icon MP4 Video   Watch on Youtube
03/29/2006

Spoofing-resistant Packet Routing for the Internet

Spoofing-resistant Packet Routing for the Internet"


Minaxi Gupta - Indiana University
(215.4MB): Video Icon MP4 Video   Watch on Youtube
04/05/2006

Chaos,Complexity, Cybernetics and Therminator:

Chaos,Complexity, Cybernetics and Therminator:


Dave Ford - Naval Postgraduate School
(216.6MB): Video Icon MP4 Video   Watch on Youtube
04/12/2006

Identity Management Strategies and Integration Perspectives

Identity Management Strategies and Integration Perspectives


David Carroll - MITRE
(201.0MB): Video Icon MP4 Video   Watch on Youtube
04/19/2006

Recent Attacks on MD5

Recent Attacks on MD5


John Black - University of Colorado at Boulder
(137.5MB): Video Icon MP4 Video   Watch on Youtube
08/23/2006

Toward Autonomic Security Policy Management

Toward Autonomic Security Policy Management


Ehab Al-Shaer, Ph.D. - DePaul University, Chicago, IL
(197.1MB): Video Icon MP4 Video   Watch on Youtube
08/30/2006

Invasive Browser Sniffing and Countermeasures

Invasive Browser Sniffing and Countermeasures


Sid Stamm - Indiana University
(234.0MB): Video Icon MP4 Video   Watch on Youtube
09/06/2006

A Multi-layered Approach to Web Application Defense

A Multi-layered Approach to Web Application Defense


Ed Finkler - Purdue University
(170.1MB): Video Icon MP4 Video   Watch on Youtube
09/13/2006

Real-Time Visualization of Network Attacks on High-Speed Links

Real-Time Visualization of Network Attacks on High-Speed Links


Hyogon Kim - Korea University/PU Visitor
(219.7MB): Video Icon MP4 Video   Watch on Youtube
09/27/2006

The Secure Information Sharing Problem and Solution Approaches

The Secure Information Sharing Problem and Solution Approaches


Ravi Sandhu - George Mason University
(218.9MB): Video Icon MP4 Video   Watch on Youtube
10/11/2006

Network Security Begins at Home: Changing Consumer Behavior for i-Safety

Network Security Begins at Home: Changing Consumer Behavior for i-Safety


Nora Rifon - Michigan State University
(218.7MB): Video Icon MP4 Video   Watch on Youtube
11/01/2006

Developing an Operational Framework for Integrated System Security

Developing an Operational Framework for Integrated System Security


Paula DeWitte - St. Mary’s Law School in San Antonio
(219.8MB): Video Icon MP4 Video   Watch on Youtube
11/29/2006

OS-Level Taint Analysis for Malware Investigation and Defense

OS-Level Taint Analysis for Malware Investigation and Defense


Dongyan Xu - Purdue University
(219.5MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information