Advancing the State and
Practice of Information
Assurance and Security
Purdue University
April 20-21, 2000
Center for Education and Research in
Information Assurance and Security
Annual Research Symposium
Poster Session
Data Security Protocol for Protecting Electronic Educational Records
(15.8 MB)
Watermarking Java Bytecode
Reducing Panoptic Effects: Managerial Applications
Secure AntNet Routing I
Secure AntNet Routing II
Factoring Large Numbers
Analyzing Secure Random Number Generators
Reliably Explointing Audit Logs
Space-Time Optical Systems for Encryption of Ultrafast Optical Data
(4.1 MB)
Know Your Personae
ROSS: Randomization of Operating System for Security
(5.0 MB)
Packet Tracker: Finding the Source of Network Traffic
Scene Adaptive Video Watermarking
Secure Multi-Party Protocols for Approximate Pattern Matching
Business Wargame for Information Security
(2.9 MB)
An Access Control Model for Video Database Systems
(3.6 MB)
Detecting Network Denial of Service
Specification and Development of an Automatic and Secure Multimedia Document System I
Specification and Development of an Automatic and Secure Multimedia Document System II
Fault Tolerant Authentication in Mobile Computing
Usability Issues in Security Related Tasks
Database Support for Audit Trails & Intrusion Detection
Why Do We Need Anonymity?
Spoofstat: How Easily can Network Attackers Hide Their Location?
Technology Transfer and the Commercialization of Emerging Security Software
(2.1 MB)
SLAM - Secure Local Area Multicast Routing
(1.2 MB)
Assessing the Implications of Very High Resolution Satellite Imagery
Firewall Testing
(3.9 MB)
Value Added Services on Software Programmable Routers
(2.0 MB)
ESP: Using Embedded Sensors For Intrusion Detection
User Profile Driven Web Security
PFIRES
(14.7 MB)
Adaptability in Multimedia Data Security I
Adaptability in Multimedia Data Security II
Security Is Community
Incident Response Database