Archive

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/11/2012


"Introduction to Biometrics"


Stephen Elliott - Purdue University
(442.4MB): Video Icon MP4 Video   Watch on Youtube
01/18/2012

 Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams


Salmin Sultana - Purdue University
(517.4MB): Video Icon MP4 Video   Watch on Youtube
01/25/2012

A Flexible System for Access Control

A Flexible System for Access Control


Frank Tompa - University of Waterloo
(543.0MB): Video Icon MP4 Video   Watch on Youtube
02/01/2012

Is it time to add Trust to the Future Internet/Web?

Is it time to add Trust to the Future Internet/Web?


George Vanecek - Futurewei Technologies
(547.3MB): Video Icon MP4 Video   Watch on Youtube
02/08/2012

Digital Citizenship:  A Target's View of Security and Life Online

Digital Citizenship: A Target's View of Security and Life Online


Kelley Misata - PhD Candidate, Purdue University
(544.4MB): Video Icon MP4 Video   Watch on Youtube
02/15/2012

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow


Simson Garfinkel - Naval Postgraduate School
(532.8MB): Video Icon MP4 Video   Watch on Youtube
02/22/2012

Vulnerability Path and Assessment

Vulnerability Path and Assessment


Ben Calloni - Lockheed Martin
(537.9MB): Video Icon MP4 Video   Watch on Youtube
02/29/2012

Cryptographic protocols in the era of cloud computing

Cryptographic protocols in the era of cloud computing


Nishanth Chandran - Microsoft Research
(552.9MB): Video Icon MP4 Video   Watch on Youtube
03/07/2012

Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness


Chenyun Dai - Purdue University
(535.8MB): Video Icon MP4 Video   Watch on Youtube
03/21/2012

Adding a Software Assurance Dimension to Supply Chain Practices

Adding a Software Assurance Dimension to Supply Chain Practices


Randall Brooks - Raytheon
(535.2MB): Video Icon MP4 Video   Watch on Youtube
03/28/2012

Privacy preserving attribute based group key management

Privacy preserving attribute based group key management


Nabeel Mohamed - PhD Candidate, Purdue University
(536.8MB): Video Icon MP4 Video   Watch on Youtube
04/04/2012

J.R. Rao, IBM Research


J.R. Rao - IBM
04/11/2012

: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach


Traian Truta - Northern Kentucky University
(538.5MB): Video Icon MP4 Video   Watch on Youtube
04/25/2012

A Practical Beginners' Guide to Differential Privacy

A Practical Beginners' Guide to Differential Privacy


Christine Task - Purdue University
(530.0MB): Video Icon MP4 Video  
08/22/2012

The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers


Scott Andersen - Lockheed Martin
(443.9MB): Video Icon MP4 Video   Watch on Youtube
08/29/2012

Challenges for R&D in the Security Field

Challenges for R&D in the Security Field


Lewis Shepherd - Microsoft
(445.2MB): Video Icon MP4 Video   Watch on Youtube
09/05/2012

The Inertia of Productivity

The Inertia of Productivity


Ed Lopez - Fortinet
(447.4MB): Video Icon MP4 Video   Watch on Youtube
09/12/2012

Trends in cyber security consulting

Trends in cyber security consulting


Sharon Chand & Chad Whitman - Deloitte & Touche
(442.5MB): Video Icon MP4 Video   Watch on Youtube
10/03/2012

 Defending Users Against Smartphone Apps: Techniques and Future Directions

Defending Users Against Smartphone Apps: Techniques and Future Directions


William Enck - North Carolina State University
(448.0MB): Video Icon MP4 Video   Watch on Youtube
10/10/2012

Understanding Spam Economics

Understanding Spam Economics


Chris Kanich - University of Illinois at Chicago
(445.1MB): Video Icon MP4 Video   Watch on Youtube
10/17/2012

The Boeing Company

The Boeing Company


Edmund Jones - Boeing
(443.0MB): Video Icon MP4 Video   Watch on Youtube
10/24/2012

Detecting Maliciousness Using Periodic Mobile Forensics

Detecting Maliciousness Using Periodic Mobile Forensics


Mark Guido - MITRE
(446.1MB): Video Icon MP4 Video   Watch on Youtube
10/31/2012

Risk perception of information security risks online

Risk perception of information security risks online


Vaibhav Garg - Indiana University
(446.6MB): Video Icon MP4 Video   Watch on Youtube
11/07/2012

Publishing Microdata with a Robust Privacy Guarantee

Publishing Microdata with a Robust Privacy Guarantee


Jianneng Cao - Purdue University
(444.5MB): Video Icon MP4 Video   Watch on Youtube
11/28/2012

A New Class of Buffer Overflow Attacks

A New Class of Buffer Overflow Attacks


Ashish Kundu - IBM
(316.8MB): Video Icon MP4 Video   Watch on Youtube
12/05/2012

You are Anonymous!!! Then you must be Lucky

You are Anonymous!!! Then you must be Lucky


Bilal Shebaro - Purdue University
(220.7MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information