The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #563
01/14/2015
Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis

Jackie Rees Ulmer - Purdue University

Episode #564
01/21/2015
Security with Privacy - A Research Agenda

Security with Privacy - A Research Agenda

Bharath Samanthula - Purdue University

Episode #565
01/28/2015
Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Savvas Savvides - Purdue University

Episode #566
02/04/2015
Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs

Omar Chowdhury - Purdue University

Episode #567
02/11/2015
Code-Pointer Integrity

Code-Pointer Integrity

Mathias Payer - Purdue University

Episode #568
02/18/2015
Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis

Ninghui Li - Purdue University

Episode #569
02/25/2015
Software updates: decisions and security implications

Software updates: decisions and security implications

Kami Vaniea - Indiana University

Episode #570
03/04/2015
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Xinming Ou - Kansas State University

Episode #571
03/11/2015
Virtual Android Malware Detection and Analysis (VAMDA)

Virtual Android Malware Detection and Analysis (VAMDA)

Andrew Pyles - MITRE

Episode #572
03/25/2015
Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel

Michelle Dennedy - Intel

Episode #573
04/01/2015
Breaking Mobile Social Networks for Automated User Location Tracking

Breaking Mobile Social Networks for Automated User Location Tracking

Kui Ren - University at Buffalo

Episode #574
04/08/2015
Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up

Rebecca Herold - Rebecca Herold & Associates, LLC

Episode #575
04/15/2015
Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently

Yan Huang - Indiana University

Episode #576
04/22/2015
CERIAS Poster Contest Winners

CERIAS Poster Contest Winners

Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University

Episode #577
04/29/2015
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Steve Bellovin - Columbia University

Episode #579
09/02/2015
SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps

SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps

Jianjun Huang - Purdue University

Episode #581
09/16/2015
Evaluation of Urban Vehicle Tracking Algorithms

Evaluation of Urban Vehicle Tracking Algorithms

John Feddema - Sandia Labs

Episode #586
10/21/2015
Anonymized Data

Anonymized Data

Koray Mancuhan - Purdue University

Episode #587
10/28/2015
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Kate Seigfried-Spellar - Purdue University

Episode #588
11/04/2015
Secure Multiparty Computation and Differential Privacy

Secure Multiparty Computation and Differential Privacy

Balamurugan Anandan - Purdue University

Episode #589
11/11/2015
Verifying Computations with (Private) State

Verifying Computations with (Private) State

Ariel Feldman - University of Chicago

Episode #590
11/18/2015
A Secure Communication Protocol for Drones and Smart Objects

A Secure Communication Protocol for Drones and Smart Objects

Jongho Won - Purdue University

Episode #592
12/09/2015
Preventing or Penalizing Equivocation in Decentralized Environments

Preventing or Penalizing Equivocation in Decentralized Environments

Aniket Kate - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!