Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.

Computer-Related Incidents: Factors Related to Cause and Prevention
Virginia Rezmierski - University of Michigan

Scenario-Driven Construction of Enterprise Information Policy
Stuart Shapiro - The MITRE Corporation

Cyber Security and the "NEW" world enterprise
Howard Schmidt - R & H Security Consulting LLC

Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
Bhavani Thuraisingham - The University of Texas at Dallas

Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
Eugene Schultz - High Tower Software

Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Dr. Albert M. K. Cheng - University of Houston
How the Criminal Law Must Adapt to the Networked World
Richard Downing - US Department of Justice

Hiding the Message Behind the Words: Advances in Natural Language Watermarking
Mercan Topkara - Purdue University

Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
Umut Topkara - Purdue University

Towards Effective and Efficient Behavior-based Trust Models
Klemens Boehm - Karlsruhe University

Applying Recreational Mathematics to Secure Multiparty Computation
Yvo Desmedt - University College, London

Protecting Data Privacy: A Practical Guide to Managing Risk
Jill Frisby - Crowe Chizek and Company LLC
Do You Have My Data? Prove it! (Provable Data Possession at Untrusted Stores)
Reza Curtmola - Purdue University

What Every Engineer Needs To Know About Security And Where To Learn It
Neil Daswani - Google

From Securing Navigation Systems to Securing Wireless Communication
Srdjan Capkun - ETH Zurich

Protocols and Systems for Privacy Preserving Protection of Digital Identity
Abhilasha Bhargav-Spantzel - Purdue University

Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing
Richard Thieme - ThiemeWorks

Wireless Router Insecurity: The Next Crimeware Epidemic
Steve Myers, Indiana University - Indiana University

CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
Ventkat Venkatakrishnan - University of Illinois at Chicago
Ways to Watch
