Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 476 to 500 of 903Affiliation shown is the affiliation at the time the talk was given.

Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.
Leszek Lilien - Western Michigan University

Multi-Policy Access Control for Healthcare using Policy Machine
Zahid Pervaiz - Purdue University

Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges
Andre Koenig - Technical University Darmstadt

Information Security Management and IT Executives in a Top Management Team
Juhee Kwon - Purdue University

Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security
Richard Power - CyLab - Carnegie Mellon

The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw
Rick Aldrich - Booz Allen Hamilton

Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance
Ragib Hasan - University of Illinois at Urbana-Champaign
Privacy-Preserving Genome Computing Through Program Specialization
Xiaofeng Wang - Indiana University

User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy - Notre Dame

Privacy – from accessing databases to location based services
Johann-Christoph Freytag - Humboldt University

Security for the Next Internet over Heterogeneous Environments
Arjan Durresi - Indiana University Purdue University at Indianapolis

Providing Privacy through Plausibly Deniable Search
Mummoorthy Murugesan - Purdue University

Mace: Systems and Language Support for Building Correct, High-Performance Networked Services
Charles Killian - Purdue University

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory
Mehmet Sahinoglu - Auburn University at Montgomery, AL

The Dark Side of Software Engineering and How to Defend Against It
Cassio Goldschmidt - Symantec

An Alternate Memory Architecture for Code Injection Prevention
Ryan Riley - Purdue University
Ways to Watch
