CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

News: General

Third Annual Information Security Symposium

Fri, May 23, 2003General

As we conclude our fourth year of research and education, we invite you to join us April 16-18 for the Third Annual Information Security Symposium.  Each year our goal is to provide an opportunity to meet students, staff and faculty; learn about our educational initiatives; explore some of our research initiatives; and interact with our sponsors, affiliates, and friends.

Registration:  http://www.conf.purdue.edu/cerias/

For more information regarding the symposium: http://www.cerias.purdue.edu/news_and_events/events/symposium/

NCSU Seeks Participants for Privacy Study

Fri, May 23, 2003General

Researchers at North Carolina State University (NCSU) are conducting an online survey about Internet privacy. The survey is supported by a National Science Foundation research grant.

CERIAS Receives Grant For Post Secondary Education

Fri, May 23, 2003General

CERIAS has been awarded a National Security Agency grant to establish a Center for the Development of Faculty in Information Assurance.

Neumann Receives Computer System Security Award

Fri, May 23, 2003General

One of the country’s pioneering figures in computer security was honored in a special ceremony at the Commerce Department’s National Institute of Standards and Technology (NIST) on June 18, 2002.

CERIAS, Discovery Park, EPICS to exhibit at Indiana State Fair

Fri, May 23, 2003General

CERIAS, Discovery Park, EPICS and other Purdue groups will be displaying exhibits at Indiana’s State Fair as part of the Indiana 2016 program.

Report on Cyber Attack Investigation Needs Released

Fri, May 23, 2003General

Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment is now available from the Institute for Security Technology Studies.

Los Angeles Times Talks to Spaf About Hackers

Fri, May 23, 2003General

This article in the L.A. Times is testament to the need for information security on all machines - personal or professional. It talks about compromising home PCs with high speed connections and about CERT’s recent warning that home users need to be watching for malicious activity.

17th Annual Computer Security Applications Conference (ACSAC)

Fri, May 23, 2003General

A reminder that the ACSAC Committee is currently soliciting papers, panels, forums, case studies, and tutorial proposals for ACSAC. This conference is internationally recognized by information system security engineers, practitioners, and researchers as the place to
exchange practical ideas about solving critical security problems. Approximately 300 attendees are expected with a mix of 70% industry, 20% government, and 10% academia.  Last year, about half the papers submitted were from outside the U.S.; we welcome global participation and attendance.

The deadline for submissions is June 1, 2001.  For general information or questions about ACSAC, please see our web page at http://www.acsac.org or email Publicity_Chair@acsac.org  For specific submission-related information, please see the following web page:    http://www.acsac.org/2001/cfp

Purdue Panel Maps Safer Wireless World for United Nations

Thu, May 22, 2003General

The security of data speeding along wireless networks should be a critical concern when deploying new connections, according to a report presented at the United Nations.

Fingerprinting for Digital Objects

Thu, May 22, 2003General

Fingerprinting schemes embed a fingerprinting sequence in a
digital object to construct an individualized version for each buyer.
A c-secure fingerprinting system can be used to identify at least
one of the colluders if a pirate object is constructed by a collusion
of up to c colluders. A ‘marking assumption’ determines possible
pirate objects (fingerprints) that the colluders can construct. We review
existing marking assumptions and their corresponding fingerprint codes,
and propose an extension that reflects the attack where the colluders
remove part of the object.

The facilitator of this program is Reihaneh Safavi-Naini of the University of Wollongong.

Get Your Degree with CERIAS