Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/13/2016

Microsemi Security Solutions and Threat Driven Security

Microsemi Security Solutions and Threat Driven Security


Jim Gallagher - Microsemi
(174.0MB): Video Icon MP4 Video   Watch on Youtube
01/20/2016

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box


Chris Clifton - Purdue University
(151.5MB): Video Icon MP4 Video   Watch on Youtube
01/27/2016

Big Data Security and Privacy

Big Data Security and Privacy


Elisa Bertino - Purdue University
(235.6MB): Video Icon MP4 Video   Watch on Youtube
02/03/2016

Robust Secure Computation

Robust Secure Computation


Hemanta Maji - Purdue University
(123.7MB): Video Icon MP4 Video   Watch on Youtube
02/10/2016

IN-ISAC: SOC, Security Awareness and More

IN-ISAC: SOC, Security Awareness and More


Nicholas Sturgeon - Indiana Office of Technology
(182.7MB): Video Icon MP4 Video   Watch on Youtube
02/17/2016

Predicting What Users Will do Next

Predicting What Users Will do Next


Bruno Ribeiro - Purdue University
(99.3MB): Video Icon MP4 Video   Watch on Youtube
02/24/2016

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule


Xukai Zou - Indiana University-Purdue University Indianapolis
(201.8MB): Video Icon MP4 Video   Watch on Youtube
03/02/2016

Context Aware, Policy based approaches to Security

Context Aware, Policy based approaches to Security


Anupam Joshi - University of Maryland, Baltimore County
(229.0MB): Video Icon MP4 Video   Watch on Youtube
03/09/2016

Batch Techniques for Practical Private Information Retrieval

Batch Techniques for Practical Private Information Retrieval


Ryan Henry - Indiana University
(365.6MB): Video Icon MP4 Video   Watch on Youtube
03/23/2016

Usable Secure Webmail for Grassroots Adoption

Usable Secure Webmail for Grassroots Adoption


Kent Seamons - Brigham Young University
(165.2MB): Video Icon MP4 Video   Watch on Youtube
04/13/2016

Privacy-preserving payments in credit networks

Privacy-preserving payments in credit networks


Pedro Moreno Sanchez - Purdue University
(137.5MB): Video Icon MP4 Video   Watch on Youtube
04/20/2016

Life as a Target

Life as a Target


Richard M. (Dickie) George
(369.8MB): Video Icon MP4 Video   Watch on Youtube
04/27/2016

ErsatzPasswords - Ending Password Cracking

ErsatzPasswords - Ending Password Cracking


Christopher N. Gutierrez - Purdue University
(130.7MB): Video Icon MP4 Video   Watch on Youtube
08/31/2016

Towards Safe In-memory Transactions

Towards Safe In-memory Transactions


Srivatsan Ravi - Purdue University
(198.4MB): Video Icon MP4 Video   Watch on Youtube
09/07/2016

Improving Outcomes with Services

Improving Outcomes with Services


Maria Andrews - Cisco
(274.5MB): Video Icon MP4 Video   Watch on Youtube
09/14/2016

General Motors Product Cybersecurity Overview

General Motors Product Cybersecurity Overview


Di Jin - General Motors
(402.8MB): Video Icon MP4 Video   Watch on Youtube
09/21/2016

The Internet of Value: Privacy and Applications

The Internet of Value: Privacy and Applications


Aniket Kate - Purdue University
(221.9MB): Video Icon MP4 Video   Watch on Youtube
09/28/2016

The role of cyber insurance in security and risk management

The role of cyber insurance in security and risk management


Nicholas Reuhs - Ice Miller LLP
(440.9MB): Video Icon MP4 Video   Watch on Youtube
10/05/2016

Growing Up In Cyber, But Is Cyber Growing Up?

Growing Up In Cyber, But Is Cyber Growing Up?


Tony Sager - Center for Internet Security
(367.2MB): Video Icon MP4 Video   Watch on Youtube
10/12/2016

Enforcing Least Privilege Memory Views for Multithreaded Applications

Enforcing Least Privilege Memory Views for Multithreaded Applications


Terry Ching-Hsiang Hsu - Purdue University
(39.0MB): Video Icon MP4 Video   Watch on Youtube
10/19/2016

Usable and Secure Human Authentication

Usable and Secure Human Authentication


Jeremiah Blocki - Purdue University
(246.9MB): Video Icon MP4 Video   Watch on Youtube
10/26/2016

New Research and Resources in NL IAS at Purdue

New Research and Resources in NL IAS at Purdue


Victor Raskin - Purdue University
(315.9MB): Video Icon MP4 Video   Watch on Youtube
11/02/2016

Protecting Computer Systems by Eliminating Vulnerabilities


Byoungyoung Lee - Purdue University
11/09/2016

A Science of Cyber Infrastructure Configuration

A Science of Cyber Infrastructure Configuration


Sanjai Narain - Vencore Labs
(256.9MB): Video Icon MP4 Video   Watch on Youtube
11/30/2016

Digital Identity Protection

Digital Identity Protection


Abhilasha Bhargav-Spantzel - Intel
(157.6MB): Video Icon MP4 Video   Watch on Youtube
12/07/2016

When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices

When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices


Yinqian Zhang - The Ohio State University
(168.8MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information