Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Abhilasha Bhargav-Spantzel, "Protocols and Systems for Privacy Preserving Protection of Digital Identity"

    In order to support emerging online activities within the digital ...

    In order to support emerging online activities within the digital information infrastructure, such as commerce, healthcare, entertainment and scientific collaboration, it is increasingly important to verify and protect the digital identity of the individu

    Nov 1, 2007 Read more
  • HD

    George Heron, "Secure Virtualization"

    The potential for security to be tightly integrated into virtual ...

    The potential for security to be tightly integrated into virtual machine technology is an exciting prospect. Not only does virtualization offer IT departments the opportunity to reduce costs, but it also offers increased agility. Now that application vend

    Oct 25, 2007 Read more
  • HD

    Srdjan Capkun, "From Securing Navigation Systems to Securing Wireless Communication"

    Recent rapid development of wireless networks of sensors, actuators and ...

    Recent rapid development of wireless networks of sensors, actuators and identifiers dictates the digitalization of our physical world and the creation of the "internet of things". In this new internet, each wireless device will sense and provide contextua

    Oct 18, 2007 Read more
  • HD

    Neil Daswani, "What Every Engineer Needs To Know About Security And Where To Learn It"

    This talk discusses how engineers can go about learning what ...

    This talk discusses how engineers can go about learning what they need to know to prevent the most significant emerging data security vulnerabilities, and the impact these vulnerabilities are having on electronic commerce. I'll review how attacks such as

    Oct 11, 2007 Read more
  • HD

    David Ehinger, "The Effect of Rootkits on the Corporate Environment"

    Sep 27, 2007 Read more
  • HD

    Jill Frisby, "Protecting Data Privacy: A Practical Guide to Managing Risk"

    Protecting valuable information assets, including personal data about employees, students, ...

    Protecting valuable information assets, including personal data about employees, students, customers, and medical patients, is an enterprise-wide responsibility. Like all components of good corporate governance, it begins with senior leadership establishi

    Sep 20, 2007 Read more
  • HD

    Ron Buskey, " Security issues within embedded software development"

    Software development processes and tools used for small communication devices ...

    Software development processes and tools used for small communication devices have changed significantly over the years. Some of these practices and processes have resulted in improvements in quality and time to market for their target products, but in so

    Sep 13, 2007 Read more
  • HD

    Yvo Desmedt, "Applying Recreational Mathematics to Secure Multiparty Computation"

    The problem of a mice traveling through a maze is ...

    The problem of a mice traveling through a maze is well known. The maze can be represented using a planar graph. We present a variant of the maze. We consider a grid vertex colored planar graph in which an adversary can choose up to t colors and remove all

    Sep 6, 2007 Read more
  • HD

    Klemens Boehm, "Towards Effective and Efficient Behavior-based Trust Models"

    Trust models have been touted to facilitate cooperation among unknown ...

    Trust models have been touted to facilitate cooperation among unknown entities. In our current work, we are interested in behavior-based trust models, i.e., models that derive the trustworthiness of an entity from its behavior in previous interactions. Ex

    Aug 30, 2007 Read more
  • HD

    Bill Horne, "Role Discovery"

    The first step in migrating to a role based access ...

    The first step in migrating to a role based access control (RBAC) system, is role development, in which teams of people meticulously define sets of roles that meet the needs of an organization's security and business requirements. Because it is so labor i

    Aug 23, 2007 Read more
Loading...