• An Adaptive Trust Model for E-commerce
  • An Evaluation of Facial Recognition in an Operational Test at Purdue University Airport
  • An Evaluation of Fingerprint Quality across an Elderly Population vis-à-vis 18-25 Year Olds
  • Categorizing CSM Systems to Derive Audit Source Specifications
  • CERIAS Continuing Education Initiatives, Workshops, & Products
  • Combinatorial Optimization of Group Key Management
  • Consumers of eHealth: Patterns of Use and Barriers
  • Discovery Park
  • Discovery Park: Bindley Bioscience Center
  • Discovery Park: Birck Nanotechnology Center
  • Discovery Park: Burton D. Morgan Center for Entrepreneurship
  • Discovery Park: e-Enterprise Center
  • Discovery Park: Learning Center
  • Embedded Sensors Project (ESP)
  • Entropy of Crowds-Like Anonymizer Networks
  • GNUnet - A Secure Peer-to-Peer Framework
  • Intrusion Detection & Computer Forensics Research Group
  • Imposing Password Restrictions for Multiple Accounts: Impact on Generation and Recall of Passwords
  • Information Assurance Digital Library (IADL)
  • Integrating Wireless Technologies for QoS and Security:Cellular-aided Mobile Wireless Ad hoc Network (CAMA)
  • Intruder Identification In Mobile Ad Hoc Networks
  • Is NIST's Recommenation of a Patch and Vulnerability Group Effective, Practical, or Necessary? The ELISA System as a Test Implementation
  • ITaP's Vulnerability Scanning Cluster built into the CIRDB to Manage Authority, Accountability and Scanning Policies
  • The Poly2 Project
  • Natural Language Information Assurance and Security
  • Privacy Preserving Association Rule Mining in Vertically Partitioned Data
  • Privacy-preserving Mining of Horizontally Partitioned Data
  • Proactive/Reactive Network Security
  • Securing a Restricted Site - Biometric Authentication at Entry Point
  • Secure Programming: Add-on Course Module and Short Course
  • Securing the Biometric Model
  • Security Impact Analysis for Common Criteria Evaluations
  • Solving Logistics Problems while Preserving Privacy
  • Vulnerability Analysis and Threat Assessment/Avoidance



  • An Adaptive Trust Model for E-commerce

    Presenters: Bharat Bargava, Yuhui Zhong
    Principal Investigators:
    • Bharat Bhargava

  • An Evaluation of Facial Recognition in an Operational Test at Purdue University Airport

    Presenters: Jeremy Morton, Mike Portell, Denver Lopp, Stephen Elliott, Ph.D., Gary Eiff, Ph.D.
    Department: Department of Industrial Technology, Department of Aviation Technology

  • An Evaluation of Fingerprint Quality across an Elderly Population vis-à-vis 18-25 Year Olds

    Presenters: Nathan C. Sickler
    Principal Investigators:
    • Dr. Stephen J. Elliott
    Department: Department of Industrial Technology

  • Categorizing CSM Systems to Derive Audit Source Specifications

    Presenters: Benjamin A. Kuperman

  • CERIAS Continuing Education Initiatives, Workshops, & Products
    Poster 1 Poster 2

    Presenters: Matt Rose
    Department: The Center for Education and Research in Information Assurance and Security

  • Combinatorial Optimization of Group Key Management

    Presenters: M. Eltoweissy, M. H. Heydari, Linda Morales, Hal Sudborough

  • Consumers of eHealth: Patterns of Use and Barriers

    Presenters: James G. Anderson. Ph.D.
    Department: Dept. of Sociology & Anthropology

  • Discovery Park


    Department: Discovery Park

  • Discovery Park: Bindley Bioscience Center


    Department: Discovery Park

  • Discovery Park: Birck Nanotechnology Center


    Department: Discovery Park

  • Discovery Park: Burton D. Morgan Center for Entrepreneurship


    Department: Discovery Park

  • Discovery Park: e-Enterprise Center


    Department: Discovery Park

  • Discovery Park: Learning Center


    Department: Discovery Park

  • Embedded Sensors Project (ESP)

    Presenters: Eugene Spafford, Keith Watson, Erin Johnson, Scott Tenaglia, Dan Aiello, Mike Dulaney, Abhilasha Bhargav, Sarika Agarwal
    Principal Investigators:
    • Eugene Spafford
    • Keith Watson

  • Entropy of Crowds-Like Anonymizer Networks

    Presenters: Samuel S. Wagstaff, Jr., Jason Gower
    Principal Investigators:
    • Samuel S. Wagstaff, Jr.
    Department: Computer Science

  • GNUnet - A Secure Peer-to-Peer Framework

    Presenters: Christian Grothoff, Krista Bennett, Blake Matheny
    Principal Investigators:
    • Mikhail Atallah
    • Jan Vitek

  • Intrusion Detection & Computer Forensics Research Group

    Presenters: Paul Williams

  • Imposing Password Restrictions for Multiple Accounts: Impact on Generation and Recall of Passwords

    Presenters: Abhilasha Bhargav, Kim-Phuong L. Vu, Robert W. Proctor
    Principal Investigators:
    • Robert Proctor

  • Information Assurance Digital Library (IADL)

    Presenters: Angel Tazzer
    Principal Investigators:
    • Melissa Dark
    • Matt Rose
    Department: The Center for Education and Research in Information Assurance and Security

  • Integrating Wireless Technologies for QoS and Security:Cellular-aided Mobile Wireless Ad hoc Network (CAMA)

    Presenters: Bharat Bargava, Xiaoxin Wu, Yi Lu, Weichao Wang, Michael D. Zowltowski
    Principal Investigators:
    • Bharat Bhargava
    Department: The Center for Education and Research in Information Assurance and Security, Dept. of Computer Sciences, Dept. of Electrical and Computer Engineering

  • Intruder Identification In Mobile Ad Hoc Networks

    Presenters: Weichao Wang
    Principal Investigators:
    • Bharat Bhargava

  • Is NIST's Recommenation of a Patch and Vulnerability Group Effective, Practical, or Necessary? The ELISA System as a Test Implementation

    Presenters: Nina Tang, Pascal Meunier
    Department: The Center for Education and Research in Information Assurance and Security

  • ITaP's Vulnerability Scanning Cluster built into the CIRDB to Manage Authority, Accountability and Scanning Policies

    Presenters: Matt Wirges, Gregory Hedrick, Pascal Meunier
    Principal Investigators: Department: The Center for Education and Research in Information Assurance and Security, ITaP

  • The Poly2 Project

    Presenters: Eugene Spafford, Keith Watson, James Early, Ben Kuperman, Paul Williams, Eric Bryant, Scott Yost, Greg Roth, Rajeev Goplalakrishna
    Principal Investigators:
    • Eugene Spafford
    • Keith Watson
    Department: The Center for Education and Research in Information Assurance and Security

  • Natural Language Information Assurance and Security

    Presenters: Mikhail J. Atallah, Victor Raskin, Krista Bennett, Christian F. Hempelmann, Mercan Karahan, Blake Matheny, Umut Topkara, Katrina E. Triezenberg, Pascal Meunier
    Principal Investigators:
    • Victor Raskin
    • Mikhail Atallah
    • Pascal Meunier
    Department: The Center for Education and Research in Information Assurance and Security, Computer Science, Linguistics

  • Privacy Preserving Association Rule Mining in Vertically Partitioned Data

    Presenters: Jaideep Vaidya, Chris Clifton
    Principal Investigators:
    • Chris Clifton

  • Privacy-preserving Mining of Horizontally Partitioned Data

    Presenters: Murat Kantarcioglu
    Principal Investigators:
    • Christopher W. Clifton

  • Proactive/Reactive Network Security

    Presenters: Hyojeong Kim, Bhagya Bethala, Ali Selcuk, Humayun Khan
    Principal Investigators:
    • Kihong Park
    Department: Network Systems Lab, Dept. of Computer Sciences

  • Securing a Restricted Site - Biometric Authentication at Entry Point

    Presenters: Eric P. Kukula
    Principal Investigators:
    • Dr. Stephen J. Elliott
    Department: Department of Industrial Technology

  • Secure Programming: Add-on Course Module and Short Course

    Presenters: Pascal Meunier
    Principal Investigators:
    • Pascal Meunier
    • Chris Clifton
    • Gustavo Rodriguez-Rivera
    Department: The Center for Education and Research in Information Assurance and Security, Computer Science

  • Securing the Biometric Model

    Presenters: A. S. Deal, S. J. Elliott, J. E. Goldman, A. C. Leniski, S. F. McGann, R. C. Skinner
    Department: School of Technology

  • Security Impact Analysis for Common Criteria Evaluations

    Presenters: Shawn Bohner, Denis Gracanin
    Department: Department of Computer Science, Virginia Tech

  • Solving Logistics Problems while Preserving Privacy

    Presenters: Wei Jiang, Prof. Chris Clifton, Prof. Reha Uzsoy, Prof. Ananth Iyer, Dr. Richard Cho
    Principal Investigators:
    • Christopher W. Clifton

  • Vulnerability Analysis and Threat Assessment/Avoidance

    Presenters: Bharat Bhargava, Leszek Lilien, Steve Cain, Miroslaw Skibniewski, Mohit Tawarmalani
    Principal Investigators:
    • Bharat Bhargava