Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Tor: Anonymous communications for government agencies, corporations, journalists... and you](/assets/video/secsem/images/secsem_20080116_full.jpg)
Tor: Anonymous communications for government agencies, corporations, journalists... and you
Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)
![What are CSO's thinking about? Top information security initiatives for 2008 and beyond …](/assets/video/secsem/images/secsem_20080130_full.jpg)
What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
Anand Singh - Target Corporation
![Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents](/assets/video/secsem/images/secsem_20080220_full.jpg)
Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
Ta-Wei "David" Wang - Purdue University
Multiple Independent Levels of Security Architecture: A High Robustness Approach Using COTS
Ben Calloni - Lockheed Martin
![Towards Event Source Location Privacy in Wireless Sensor Networks](/assets/video/secsem/images/secsem_20080326_full.jpg)
Towards Event Source Location Privacy in Wireless Sensor Networks
Sencun Zhu - Pennsylvania State
![Exploiting Opportunistic Scheduling in Cellular Data Networks](/assets/video/secsem/images/secsem_20080402_full.jpg)
Exploiting Opportunistic Scheduling in Cellular Data Networks
Hao Chen - University of California, Davis
![Shifting focus: Aligning security with risk management](/assets/video/secsem/images/secsem_20080409_full.jpg)
Shifting focus: Aligning security with risk management
Jack Jones - Risk Management Insight
![Exploitable Redirects on the Web: Identification, Prevalence, and Defense](/assets/video/secsem/images/secsem_20080827_full.jpg)
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Minaxi Gupta - Indiana University
![Private Queries in Location Based Services: Anonymizers are not Necessary](/assets/video/secsem/images/secsem_20080903_full.jpg)
Private Queries in Location Based Services: Anonymizers are not Necessary
Gabriel Ghinita - Purdue University
![Virtualization: Resource Coupling and Security across the Stack](/assets/video/secsem/images/secsem_20080910_full.jpg)
Virtualization: Resource Coupling and Security across the Stack
Dennis Moreau - Configuresoft
![Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors](/assets/video/secsem/images/secsem_20080917_full.jpg)
Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
Shimon Modi - Purdue University
![Measuring the Attack Surfaces of Enterprise Software Systems](/assets/video/secsem/images/secsem_20081008_full.jpg)
Measuring the Attack Surfaces of Enterprise Software Systems
Yuecel Karabulut - SAP Research
![Signature Analysis Coupled With Slicing Analysis for the Validation of Software](/assets/video/secsem/images/secsem_20081015_full.jpg)
Signature Analysis Coupled With Slicing Analysis for the Validation of Software
Adam Dugger - Arxan
![Trends in Identity Management](/assets/video/secsem/images/secsem_20081029_full.jpg)
Trends in Identity Management
Kenji Takahashi - ITT Information Sharing Platform Laboratories
![The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline](/assets/video/secsem/images/secsem_20081105_full.jpg)
The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
Scott Orton - Ratheon
![Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step](/assets/video/secsem/images/secsem_20081210_full.jpg)
Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step
Ibrahim Baggili - Purdue University
Ways to Watch
![YouTube](/assets/images/youtube_200.png)