As we conclude our fourth year of research and education, we invite you to join us April 16-18 for the Third Annual Information Security Symposium. Each year our goal is to provide an opportunity to meet students, staff and faculty; learn about our educational initiatives; explore some of our research initiatives; and interact with our sponsors, affiliates, and friends.Registration: http://www.conf.purdue.edu/cerias/ For more information regarding the symposium: http://www.cerias.purdue.edu/news_and_events/events/symposium/
Researchers at North Carolina State University (NCSU) are conducting an online survey about Internet privacy. The survey is supported by a National Science Foundation research grant.
CERIAS has been awarded a National Security Agency grant to establish a Center for the Development of Faculty in Information Assurance.
One of the country’s pioneering figures in computer security was honored in a special ceremony at the Commerce Department’s National Institute of Standards and Technology (NIST) on June 18, 2002.
CERIAS, Discovery Park, EPICS and other Purdue groups will be displaying exhibits at Indiana’s State Fair as part of the Indiana 2016 program.
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment is now available from the Institute for Security Technology Studies.
This article in the L.A. Times is testament to the need for information security on all machines - personal or professional. It talks about compromising home PCs with high speed connections and about CERT’s recent warning that home users need to be watching for malicious activity.
A reminder that the ACSAC Committee is currently soliciting papers, panels, forums, case studies, and tutorial proposals for ACSAC. This conference is internationally recognized by information system security engineers, practitioners, and researchers as the place to
exchange practical ideas about solving critical security problems. Approximately 300 attendees are expected with a mix of 70% industry, 20% government, and 10% academia. Last year, about half the papers submitted were from outside the U.S.; we welcome global participation and attendance.
The deadline for submissions is June 1, 2001. For general information or questions about ACSAC, please see our web page at http://www.acsac.org or email Publicity_Chair@acsac.org For specific submission-related information, please see the following web page: http://www.acsac.org/2001/cfp
The security of data speeding along wireless networks should be a critical concern when deploying new connections, according to a report presented at the United Nations.
Fingerprinting schemes embed a fingerprinting sequence in a
digital object to construct an individualized version for each buyer.
A c-secure fingerprinting system can be used to identify at least
one of the colluders if a pirate object is constructed by a collusion
of up to c colluders. A ‘marking assumption’ determines possible
pirate objects (fingerprints) that the colluders can construct. We review
existing marking assumptions and their corresponding fingerprint codes,
and propose an extension that reflects the attack where the colluders
remove part of the object.
The facilitator of this program is Reihaneh Safavi-Naini of the University of Wollongong.