The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/11/2012
Introduction to Biometrics

Introduction to Biometrics

Stephen Elliott - Purdue University

01/18/2012
Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams

Salmin Sultana - Purdue University

01/25/2012
A Flexible System for Access Control

A Flexible System for Access Control

Frank Tompa - University of Waterloo

02/01/2012
Is it Time to add Trust to the Future Internet/Web?

Is it Time to add Trust to the Future Internet/Web?

George Vanecek - Futurewei Technologies

02/08/2012
Digital Citizenship:  A Target's View of Security and Life Online

Digital Citizenship: A Target's View of Security and Life Online

Kelley Misata - PhD Candidate, Purdue University

02/15/2012
Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Simson Garfinkel - Naval Postgraduate School

02/22/2012
Vulnerability Path and Assessment

Vulnerability Path and Assessment

Ben Calloni - Lockheed Martin

02/29/2012
Cryptographic Protocols in the Era of Cloud Computing

Cryptographic Protocols in the Era of Cloud Computing

Nishanth Chandran - Microsoft Research

03/07/2012
Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness

Chenyun Dai - Purdue University

03/28/2012
Privacy preserving attribute based group key management

Privacy preserving attribute based group key management

Nabeel Mohamed - PhD Candidate, Purdue University

04/04/2012

J.R. Rao, IBM Research

J.R. Rao - IBM

04/11/2012
: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach

Traian Truta - Northern Kentucky University

04/25/2012
A Practical Beginners' Guide to Differential Privacy

A Practical Beginners' Guide to Differential Privacy

Christine Task - Purdue University

08/22/2012
The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers

Scott Andersen - Lockheed Martin

08/29/2012
Challenges for R&D in the Security Field

Challenges for R&D in the Security Field

Lewis Shepherd - Microsoft

09/05/2012
The Inertia of Productivity

The Inertia of Productivity

Ed Lopez - Fortinet

09/12/2012
Trends in cyber security consulting

Trends in cyber security consulting

Sharon Chand & Chad Whitman - Deloitte & Touche

10/03/2012
Defending Users Against Smartphone Apps: Techniques and Future Directions

Defending Users Against Smartphone Apps: Techniques and Future Directions

William Enck - North Carolina State University

10/10/2012
Understanding Spam Economics

Understanding Spam Economics

Chris Kanich - University of Illinois at Chicago

10/17/2012
The Boeing Company

The Boeing Company

Edmund Jones - Boeing

10/31/2012
Risk perception of information security risks online

Risk perception of information security risks online

Vaibhav Garg - Indiana University

11/07/2012
Publishing Microdata with a Robust Privacy Guarantee

Publishing Microdata with a Robust Privacy Guarantee

Jianneng Cao - Purdue University

11/28/2012
A New Class of Buffer Overflow Attacks

A New Class of Buffer Overflow Attacks

Ashish Kundu - IBM

12/05/2012
You are Anonymous!!! Then you must be Lucky

You are Anonymous!!! Then you must be Lucky

Bilal Shebaro - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!