Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
A Rules Based Statistical Algorithm for Keystroke Detection
Paul Kidwell - Purdue University
An Alternate Memory Architecture for Code Injection Prevention
Ryan Riley - Purdue University
The Dark Side of Software Engineering and How to Defend Against It
Cassio Goldschmidt - Symantec
Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory
Mehmet Sahinoglu - Auburn University at Montgomery, AL
Mace: Systems and Language Support for Building Correct, High-Performance Networked Services
Charles Killian - Purdue University
Providing Privacy through Plausibly Deniable Search
Mummoorthy Murugesan - Purdue University
Security for the Next Internet over Heterogeneous Environments
Arjan Durresi - Indiana University Purdue University at Indianapolis
Privacy – from accessing databases to location based services
Johann-Christoph Freytag - Humboldt University
User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy - Notre Dame
Privacy-Preserving Genome Computing Through Program Specialization
Xiaofeng Wang - Indiana University
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance
Ragib Hasan - University of Illinois at Urbana-Champaign
The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw
Rick Aldrich - Booz Allen Hamilton
Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security
Richard Power - CyLab - Carnegie Mellon
Information Security Management and IT Executives in a Top Management Team
Juhee Kwon - Purdue University
Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges
Andre Koenig - Technical University Darmstadt
Multi-Policy Access Control for Healthcare using Policy Machine
Zahid Pervaiz - Purdue University
Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.
Leszek Lilien - Western Michigan University
Safely Analyzing Sensitive Network Data
Gerome Miklau - University of Massachusetts, Amherst