The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 301 to 325 of 908

Affiliation shown is the affiliation at the time the talk was given.

01/13/2016
Microsemi Security Solutions and Threat Driven Security

Microsemi Security Solutions and Threat Driven Security

Jim Gallagher - Microsemi

12/09/2015
Preventing or Penalizing Equivocation in Decentralized Environments

Preventing or Penalizing Equivocation in Decentralized Environments

Aniket Kate - Purdue University

11/18/2015
A Secure Communication Protocol for Drones and Smart Objects

A Secure Communication Protocol for Drones and Smart Objects

Jongho Won - Purdue University

11/11/2015
Verifying Computations with (Private) State

Verifying Computations with (Private) State

Ariel Feldman - University of Chicago

11/04/2015
Secure Multiparty Computation and Differential Privacy

Secure Multiparty Computation and Differential Privacy

Balamurugan Anandan - Purdue University

10/28/2015
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Kate Seigfried-Spellar - Purdue University

10/21/2015
Anonymized Data

Anonymized Data

Koray Mancuhan - Purdue University

09/16/2015
Evaluation of Urban Vehicle Tracking Algorithms

Evaluation of Urban Vehicle Tracking Algorithms

John Feddema - Sandia Labs

04/22/2015
CERIAS Poster Contest Winners

CERIAS Poster Contest Winners

Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University

04/15/2015
Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently

Yan Huang - Indiana University

04/08/2015
Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up

Rebecca Herold - Rebecca Herold & Associates, LLC

03/25/2015
Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel

Michelle Dennedy - Intel

03/04/2015
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Xinming Ou - Kansas State University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!