Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Jean Camp, "Net Trust: Identification Through Social Context"

    In the nineties the disconnection between physical experience and the ...

    In the nineties the disconnection between physical experience and the digital networked experience was celebrated - individuals are said to move into cyberspace, become virtual and leave the constraints of the physical realm. The increase in fraud, diffic

    Jan 18, 2006 Read more
  • HD

    Simson Garfinkel, "Cross-Drive Forensic Analysis"

    This talk introduces cross-drive analysis (CDA), a new approach for ...

    This talk introduces cross-drive analysis (CDA), a new approach for performing analysis of forensic data sets that are too large or complex to be analyzed with today's existing tools. CDA works by performing systematic information extraction and cross-cor

    Jan 11, 2006 Read more
  • HD

    Jelena Mirkovic, "Clouseau: A practical IP spoofing defense through route-based filtering"

    IP spoofing accompanies many malicious activities and is even means ...

    IP spoofing accompanies many malicious activities and is even means for performing reflector DDoS attacks. Route-based filtering (RBF) enables a router to filter spoofed packets based on their incoming interface - this information is stored in an incoming

    Dec 7, 2005 Read more
  • HD

    Stanislaw Jarecki, "Secret Handshakes"

    Secret Handshake is an authentication protocol with non-standard and strong ...

    Secret Handshake is an authentication protocol with non-standard and strong anonymity property: Namely, the secrecy of the *affiliations* (i.e. the certificates) of party A who engages in this authentication protocol with party B will be protected against

    Nov 30, 2005 Read more
  • HD

    Shouhuai Xu, "Privacy-preserving Policy-driven Access Control with Mixed Credentials"

    Access control in decentralized systems is an important problem that ...

    Access control in decentralized systems is an important problem that has not been fully understood, except perhaps that it should be based on credentials. There are mainly two research approaches towards this goal: one is to pursue powerful individual cre

    Nov 16, 2005 Read more
  • HD

    Anna Squicciarini, "Privacy and anonymity in Trust Negotiations"."

    Trust negotiation is an emerging approach for establishing trust in ...

    Trust negotiation is an emerging approach for establishing trust in open systems, where sensitive interactions may often occur between entities with no prior knowledge of each other. Although several proposals today exist of systems for the management of

    Nov 9, 2005 Read more
  • HD

    Bryant G. Tow, "A Demonstration in the Need for a Layered Security Model"

    Oct 26, 2005 Read more
  • HD

    Dr. Angelos D. Keromytis, "Toward Self-healing Software"

    As systems grow in size and complexity, our ability to ...

    As systems grow in size and complexity, our ability to protect them through manual intervention or static defenses degrades. We believe that, in addition to proper design principles and proactive mechanisms, automated reactive approaches must be employed

    Oct 19, 2005 Read more
  • HD

    Dan Massey, "Securing the Internet's Domain Name System"

    This talk considers security challenges facing the Internet's Domain Name ...

    This talk considers security challenges facing the Internet's Domain Name System (DNS). The DNS is one of the most widely used and least secure Internet systems. Viirtually every Internet application relies on the DNS to convert names into IP addresses an

    Oct 5, 2005 Read more
  • HD

    Ting Yu, "A Framework for Identifying Compromised Nodes in Sensor Networks"

    Sensor networks are vulnerable to physical attacks. Once a node's ...

    Sensor networks are vulnerable to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Most existing techniques focus on detecting and tole

    Sep 21, 2005 Read more
Loading...