CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/13/2016

Microsemi Security Solutions and Threat Driven Security

Microsemi Security Solutions and Threat Driven Security


Jim Gallagher - Microsemi
(174.0MB): Video Icon MP4 Video   Watch on Youtube
01/20/2016

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box

Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box


Chris Clifton - Purdue University
(151.5MB): Video Icon MP4 Video   Watch on Youtube
01/27/2016

Big Data Security and Privacy

Big Data Security and Privacy


Elisa Bertino - Purdue University
(235.6MB): Video Icon MP4 Video   Watch on Youtube
02/03/2016

Robust Secure Computation

Robust Secure Computation


Hemanta Maji - Purdue University
(123.7MB): Video Icon MP4 Video   Watch on Youtube
02/10/2016

IN-ISAC: SOC, Security Awareness and More

IN-ISAC: SOC, Security Awareness and More


Nicholas Sturgeon - Indiana Office of Technology
(182.7MB): Video Icon MP4 Video   Watch on Youtube
02/17/2016

Predicting What Users Will do Next

Predicting What Users Will do Next


Bruno Ribeiro - Purdue University
(99.3MB): Video Icon MP4 Video   Watch on Youtube
02/24/2016

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule


Xukai Zou - Indiana University-Purdue University Indianapolis
(201.8MB): Video Icon MP4 Video   Watch on Youtube
03/02/2016

Context Aware, Policy based approaches to Security

Context Aware, Policy based approaches to Security


Anupam Joshi - University of Maryland, Baltimore County
(229.0MB): Video Icon MP4 Video   Watch on Youtube
03/09/2016

Batch Techniques for Practical Private Information Retrieval

Batch Techniques for Practical Private Information Retrieval


Ryan Henry - Indiana University
(365.6MB): Video Icon MP4 Video   Watch on Youtube
03/23/2016

Usable Secure Webmail for Grassroots Adoption

Usable Secure Webmail for Grassroots Adoption


Kent Seamons - Brigham Young University
(165.2MB): Video Icon MP4 Video   Watch on Youtube
04/13/2016

Privacy-preserving payments in credit networks

Privacy-preserving payments in credit networks


Pedro Moreno Sanchez - Purdue University
(137.5MB): Video Icon MP4 Video   Watch on Youtube
04/20/2016

Life as a Target

Life as a Target


Richard M. (Dickie) George
(369.8MB): Video Icon MP4 Video   Watch on Youtube
04/27/2016

ErsatzPasswords - Ending Password Cracking

ErsatzPasswords - Ending Password Cracking


Christopher N. Gutierrez - Purdue University
(130.7MB): Video Icon MP4 Video   Watch on Youtube
08/31/2016

Towards Safe In-memory Transactions

Towards Safe In-memory Transactions


Srivatsan Ravi - Purdue University
(198.4MB): Video Icon MP4 Video   Watch on Youtube
09/07/2016

Improving Outcomes with Services

Improving Outcomes with Services


Maria Andrews - Cisco
(274.5MB): Video Icon MP4 Video   Watch on Youtube
09/14/2016

General Motors Product Cybersecurity Overview

General Motors Product Cybersecurity Overview


Di Jin - General Motors
(402.8MB): Video Icon MP4 Video   Watch on Youtube
09/21/2016

The Internet of Value: Privacy and Applications

The Internet of Value: Privacy and Applications


Aniket Kate - Purdue University
(221.9MB): Video Icon MP4 Video   Watch on Youtube
09/28/2016

The role of cyber insurance in security and risk management

The role of cyber insurance in security and risk management


Nicholas Reuhs - Ice Miller LLP
(440.9MB): Video Icon MP4 Video   Watch on Youtube
10/05/2016

Growing Up In Cyber, But Is Cyber Growing Up?

Growing Up In Cyber, But Is Cyber Growing Up?


Tony Sager - Center for Internet Security
(367.2MB): Video Icon MP4 Video   Watch on Youtube
10/12/2016

Enforcing Least Privilege Memory Views for Multithreaded Applications

Enforcing Least Privilege Memory Views for Multithreaded Applications


Terry Ching-Hsiang Hsu - Purdue University
(39.0MB): Video Icon MP4 Video   Watch on Youtube
10/19/2016

Usable and Secure Human Authentication

Usable and Secure Human Authentication


Jeremiah Blocki - Purdue University
(246.9MB): Video Icon MP4 Video   Watch on Youtube
10/26/2016

New Research and Resources in NL IAS at Purdue

New Research and Resources in NL IAS at Purdue


Victor Raskin - Purdue University
(315.9MB): Video Icon MP4 Video   Watch on Youtube
11/02/2016

Protecting Computer Systems by Eliminating Vulnerabilities


Byoungyoung Lee - Purdue University
11/09/2016

A Science of Cyber Infrastructure Configuration

A Science of Cyber Infrastructure Configuration


Sanjai Narain - Vencore Labs
(256.9MB): Video Icon MP4 Video   Watch on Youtube
11/30/2016

Digital Identity Protection

Digital Identity Protection


Abhilasha Bhargav-Spantzel - Intel
(157.6MB): Video Icon MP4 Video   Watch on Youtube
12/07/2016

When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices

When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices


Yinqian Zhang - The Ohio State University
(168.8MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.