Posters > 2012
Assured Identity and Privacy
- Challenges in Biometric Usability [FC2-00C]
- Differential Identifiability [75C-D67]
- Is This Hardcopy an Original? [A33-F8E]
- Issues in Cyber Forensics [50C-D5D]
- Privacy Preserving Tatonnement [0CC-4FA]
- Privacy through Identity Management [192-77E]
- Private Anonymous Messaging [4B8-28C]
- Trust, Empathy, Social Identity, and Contribution of Knowledge within Patient Online Communities [276-91D]
- Zoo Animal Stability [141-BAA]
End System Security
Human Centric Security
- NL IAS Marches On [408-4BE]
- Trust Framework for Social Networks [291-153]
Network Security
- Over-the-Air Penetration Testing [827-B9D]
- Resource Mapping on Hybrid Testbeds [46C-991]
Policy, Law and Management
- Amazon Kindle Forensics [78E-4D3]
- CERIAS Information Security Archive [0B5-6CD]
- Minding our ISPs and ICTs: A Model of the Policy Challenges to Alleviate the Digital Divide [E45-7CA]
- Motorola Xoom Examination [C61-907]
Prevention, Detection and Response
- Closing the Pandora’s Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks [544-4BA]
- Closing the Pandora’s Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks [BC9-697]
- Computer Forensics at NIST [CE3-76D]
- Data Hiding in Cell Phones [AB0-7FE]
- Data Hiding in Cell Phones [95E-E13]
- Insider Threat Mitigation Framework [259-DBA]