CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/11/2012


"Introduction to Biometrics"


Stephen Elliott - Purdue University
(442.4MB): Video Icon MP4 Video   Watch on Youtube
01/18/2012

 Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams


Salmin Sultana - Purdue University
(517.4MB): Video Icon MP4 Video   Watch on Youtube
01/25/2012

A Flexible System for Access Control

A Flexible System for Access Control


Frank Tompa - University of Waterloo
(543.0MB): Video Icon MP4 Video   Watch on Youtube
02/01/2012

Is it time to add Trust to the Future Internet/Web?

Is it time to add Trust to the Future Internet/Web?


George Vanecek - Futurewei Technologies
(547.3MB): Video Icon MP4 Video   Watch on Youtube
02/08/2012

Digital Citizenship:  A Target's View of Security and Life Online

Digital Citizenship: A Target's View of Security and Life Online


Kelley Misata - PhD Candidate, Purdue University
(544.4MB): Video Icon MP4 Video   Watch on Youtube
02/15/2012

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow


Simson Garfinkel - Naval Postgraduate School
(532.8MB): Video Icon MP4 Video   Watch on Youtube
02/22/2012

Vulnerability Path and Assessment

Vulnerability Path and Assessment


Ben Calloni - Lockheed Martin
(537.9MB): Video Icon MP4 Video   Watch on Youtube
02/29/2012

Cryptographic protocols in the era of cloud computing

Cryptographic protocols in the era of cloud computing


Nishanth Chandran - Microsoft Research
(552.9MB): Video Icon MP4 Video   Watch on Youtube
03/07/2012

Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness


Chenyun Dai - Purdue University
(535.8MB): Video Icon MP4 Video   Watch on Youtube
03/21/2012

Adding a Software Assurance Dimension to Supply Chain Practices

Adding a Software Assurance Dimension to Supply Chain Practices


Randall Brooks - Raytheon
(535.2MB): Video Icon MP4 Video   Watch on Youtube
03/28/2012

Privacy preserving attribute based group key management

Privacy preserving attribute based group key management


Nabeel Mohamed - PhD Candidate, Purdue University
(536.8MB): Video Icon MP4 Video   Watch on Youtube
04/04/2012

J.R. Rao, IBM Research


J.R. Rao - IBM
04/11/2012

: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach


Traian Truta - Northern Kentucky University
(538.5MB): Video Icon MP4 Video   Watch on Youtube
04/25/2012

A Practical Beginners' Guide to Differential Privacy

A Practical Beginners' Guide to Differential Privacy


Christine Task - Purdue University
(530.0MB): Video Icon MP4 Video  
08/22/2012

The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers


Scott Andersen - Lockheed Martin
(443.9MB): Video Icon MP4 Video   Watch on Youtube
08/29/2012

Challenges for R&D in the Security Field

Challenges for R&D in the Security Field


Lewis Shepherd - Microsoft
(445.2MB): Video Icon MP4 Video   Watch on Youtube
09/05/2012

The Inertia of Productivity

The Inertia of Productivity


Ed Lopez - Fortinet
(447.4MB): Video Icon MP4 Video   Watch on Youtube
09/12/2012

Trends in cyber security consulting

Trends in cyber security consulting


Sharon Chand & Chad Whitman - Deloitte & Touche
(442.5MB): Video Icon MP4 Video   Watch on Youtube
10/03/2012

 Defending Users Against Smartphone Apps: Techniques and Future Directions

Defending Users Against Smartphone Apps: Techniques and Future Directions


William Enck - North Carolina State University
(448.0MB): Video Icon MP4 Video   Watch on Youtube
10/10/2012

Understanding Spam Economics

Understanding Spam Economics


Chris Kanich - University of Illinois at Chicago
(445.1MB): Video Icon MP4 Video   Watch on Youtube
10/17/2012

The Boeing Company

The Boeing Company


Edmund Jones - Boeing
(443.0MB): Video Icon MP4 Video   Watch on Youtube
10/24/2012

Detecting Maliciousness Using Periodic Mobile Forensics

Detecting Maliciousness Using Periodic Mobile Forensics


Mark Guido - MITRE
(446.1MB): Video Icon MP4 Video   Watch on Youtube
10/31/2012

Risk perception of information security risks online

Risk perception of information security risks online


Vaibhav Garg - Indiana University
(446.6MB): Video Icon MP4 Video   Watch on Youtube
11/07/2012

Publishing Microdata with a Robust Privacy Guarantee

Publishing Microdata with a Robust Privacy Guarantee


Jianneng Cao - Purdue University
(444.5MB): Video Icon MP4 Video   Watch on Youtube
11/28/2012

A New Class of Buffer Overflow Attacks

A New Class of Buffer Overflow Attacks


Ashish Kundu - IBM
(316.8MB): Video Icon MP4 Video   Watch on Youtube
12/05/2012

You are Anonymous!!! Then you must be Lucky

You are Anonymous!!! Then you must be Lucky


Bilal Shebaro - Purdue University
(220.7MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.