The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/14/2015
Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis

Jackie Rees Ulmer - Purdue University

01/21/2015
Security with Privacy - A Research Agenda

Security with Privacy - A Research Agenda

Bharath Samanthula - Purdue University

02/04/2015
Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs

Omar Chowdhury - Purdue University

02/11/2015
Code-Pointer Integrity

Code-Pointer Integrity

Mathias Payer - Purdue University

02/18/2015
Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis

Ninghui Li - Purdue University

02/25/2015
Software updates: decisions and security implications

Software updates: decisions and security implications

Kami Vaniea - Indiana University

03/04/2015
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Xinming Ou - Kansas State University

03/25/2015
Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel

Michelle Dennedy - Intel

04/08/2015
Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up

Rebecca Herold - Rebecca Herold & Associates, LLC

04/15/2015
Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently

Yan Huang - Indiana University

04/22/2015
CERIAS Poster Contest Winners

CERIAS Poster Contest Winners

Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University

09/16/2015
Evaluation of Urban Vehicle Tracking Algorithms

Evaluation of Urban Vehicle Tracking Algorithms

John Feddema - Sandia Labs

10/21/2015
Anonymized Data

Anonymized Data

Koray Mancuhan - Purdue University

10/28/2015
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Kate Seigfried-Spellar - Purdue University

11/04/2015
Secure Multiparty Computation and Differential Privacy

Secure Multiparty Computation and Differential Privacy

Balamurugan Anandan - Purdue University

11/11/2015
Verifying Computations with (Private) State

Verifying Computations with (Private) State

Ariel Feldman - University of Chicago

11/18/2015
A Secure Communication Protocol for Drones and Smart Objects

A Secure Communication Protocol for Drones and Smart Objects

Jongho Won - Purdue University

12/09/2015
Preventing or Penalizing Equivocation in Decentralized Environments

Preventing or Penalizing Equivocation in Decentralized Environments

Aniket Kate - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!