Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 576 to 600 of 879Affiliation shown is the affiliation at the time the talk was given.
Aligning Privacy Values, Policies, Law and Software Requirements
Annie Anton - North Carolina State University/ Associate Professor and Director, ThePrivacyPlace.Org
Managing Risk of Information Systems Security Incidents
Dr. Fariborz Farahmand - Purdue University/CERIAS
![A Framework for Identifying Compromised Nodes in Sensor Networks](/assets/video/secsem/images/secsem_20050921_full.jpg)
A Framework for Identifying Compromised Nodes in Sensor Networks
Ting Yu - North Carolina State University
![Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur](/assets/video/secsem/images/secsem_20050914_full.jpg)
Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur
Peter Bajcsy - University of Illinois at Urbana-Champaign/ National Center for Supercomputing Applications (NCSA)
![Minimizing Trust Liabilities in Secure Group Messaging Infrastructures](/assets/video/secsem/images/secsem_20050831_full.jpg)
Minimizing Trust Liabilities in Secure Group Messaging Infrastructures
Himanshu Khurana - University of Illinois at Urbana-Champaign
![Traust and PeerTrust2: Applying Trust Negotiation to Real Systems](/assets/video/secsem/images/secsem_20050420_full.jpg)
Traust and PeerTrust2: Applying Trust Negotiation to Real Systems
Marianne Winslett - University of Illinois at Urbana-Champaign
![Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks](/assets/video/secsem/images/secsem_20050330_full.jpg)
Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks
Helen J. Wang - Microsoft Research
![Where's the FEEB? Effectiveness of Instruction Set Randomization](/assets/video/secsem/images/secsem_20050309_full.jpg)
Where's the FEEB? Effectiveness of Instruction Set Randomization
David Evans - University of Virginia
![Using process labels to obtain forensic and traceback information](/assets/video/secsem/images/secsem_20050302_full.jpg)
Using process labels to obtain forensic and traceback information
Florian Buchholz - Purdue University
![Perturbation of Multivariable Public-key Cryptosystems](/assets/video/secsem/images/secsem_20050223_full.jpg)
Perturbation of Multivariable Public-key Cryptosystems
Jintai Ding - University of Cincinnati
Network Data Streaming - A Computer Scientist's Journey in Signal Processing
Jun Xu - Georgia Tech
![Obfuscated Databases: Definitions and Constructions](/assets/video/secsem/images/secsem_20050202_full.jpg)
Obfuscated Databases: Definitions and Constructions
Vitaly Shmatikov - University of Texas at Austin
Ways to Watch
![YouTube](/assets/images/youtube_200.png)