Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Tor: Anonymous communications for government agencies, corporations, journalists... and you
Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)
What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
Anand Singh - Target Corporation
Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
Ta-Wei "David" Wang - Purdue University
Multiple Independent Levels of Security Architecture: A High Robustness Approach Using COTS
Ben Calloni - Lockheed Martin
Towards Event Source Location Privacy in Wireless Sensor Networks
Sencun Zhu - Pennsylvania State
Exploiting Opportunistic Scheduling in Cellular Data Networks
Hao Chen - University of California, Davis
Shifting focus: Aligning security with risk management
Jack Jones - Risk Management Insight
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Minaxi Gupta - Indiana University
Private Queries in Location Based Services: Anonymizers are not Necessary
Gabriel Ghinita - Purdue University
Virtualization: Resource Coupling and Security across the Stack
Dennis Moreau - Configuresoft
Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
Shimon Modi - Purdue University
Measuring the Attack Surfaces of Enterprise Software Systems
Yuecel Karabulut - SAP Research
Signature Analysis Coupled With Slicing Analysis for the Validation of Software
Adam Dugger - Arxan
Trends in Identity Management
Kenji Takahashi - ITT Information Sharing Platform Laboratories
The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
Scott Orton - Ratheon
Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step
Ibrahim Baggili - Purdue University