The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #483
01/11/2012
Introduction to Biometrics

Introduction to Biometrics

Stephen Elliott - Purdue University

Episode #484
01/18/2012
Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams

Salmin Sultana - Purdue University

Episode #485
01/25/2012
A Flexible System for Access Control

A Flexible System for Access Control

Frank Tompa - University of Waterloo

Episode #486
02/01/2012
Is it Time to add Trust to the Future Internet/Web?

Is it Time to add Trust to the Future Internet/Web?

George Vanecek - Futurewei Technologies

Episode #487
02/08/2012
Digital Citizenship:  A Target's View of Security and Life Online

Digital Citizenship: A Target's View of Security and Life Online

Kelley Misata - PhD Candidate, Purdue University

Episode #488
02/15/2012
Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Simson Garfinkel - Naval Postgraduate School

Episode #489
02/22/2012
Vulnerability Path and Assessment

Vulnerability Path and Assessment

Ben Calloni - Lockheed Martin

Episode #490
02/29/2012
Cryptographic Protocols in the Era of Cloud Computing

Cryptographic Protocols in the Era of Cloud Computing

Nishanth Chandran - Microsoft Research

Episode #491
03/07/2012
Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness

Chenyun Dai - Purdue University

Episode #492
03/21/2012
Adding a Software Assurance Dimension to Supply Chain Practices

Adding a Software Assurance Dimension to Supply Chain Practices

Randall Brooks - Raytheon

Episode #493
03/28/2012
Privacy preserving attribute based group key management

Privacy preserving attribute based group key management

Nabeel Mohamed - PhD Candidate, Purdue University

Episode #494
04/04/2012

J.R. Rao, IBM Research

J.R. Rao - IBM

Episode #495
04/11/2012
: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach

Traian Truta - Northern Kentucky University

Episode #497
04/25/2012
A Practical Beginners' Guide to Differential Privacy

A Practical Beginners' Guide to Differential Privacy

Christine Task - Purdue University

Episode #498
08/22/2012
The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers

Scott Andersen - Lockheed Martin

Episode #499
08/29/2012
Challenges for R&D in the Security Field

Challenges for R&D in the Security Field

Lewis Shepherd - Microsoft

Episode #500
09/05/2012
The Inertia of Productivity

The Inertia of Productivity

Ed Lopez - Fortinet

Episode #501
09/12/2012
Trends in cyber security consulting

Trends in cyber security consulting

Sharon Chand & Chad Whitman - Deloitte & Touche

Episode #504
10/03/2012
Defending Users Against Smartphone Apps: Techniques and Future Directions

Defending Users Against Smartphone Apps: Techniques and Future Directions

William Enck - North Carolina State University

Episode #505
10/10/2012
Understanding Spam Economics

Understanding Spam Economics

Chris Kanich - University of Illinois at Chicago

Episode #506
10/17/2012
The Boeing Company

The Boeing Company

Edmund Jones - Boeing

Episode #507
10/24/2012
Detecting Maliciousness Using Periodic Mobile Forensics

Detecting Maliciousness Using Periodic Mobile Forensics

Mark Guido - MITRE

Episode #508
10/31/2012
Risk perception of information security risks online

Risk perception of information security risks online

Vaibhav Garg - Indiana University

Episode #509
11/07/2012
Publishing Microdata with a Robust Privacy Guarantee

Publishing Microdata with a Robust Privacy Guarantee

Jianneng Cao - Purdue University

Episode #510
11/14/2012
Not the Who but the What -- New applications of Hardware Identity

Not the Who but the What -- New applications of Hardware Identity

Hal Aldridge - Sypris

Episode #511
11/28/2012
A New Class of Buffer Overflow Attacks

A New Class of Buffer Overflow Attacks

Ashish Kundu - IBM

Episode #512
12/05/2012
You are Anonymous!!! Then you must be Lucky

You are Anonymous!!! Then you must be Lucky

Bilal Shebaro - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!