Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Joshua Corman, "Why so CERIAS!? Why we're losing and what to do about it."

    Mar 27, 2014 Read more
  • HD

    Marina Blanton, "General-Purpose Secure Computation and Outsourcing"

    The desire to compute on sensitive data without revealing it ...

    The desire to compute on sensitive data without revealing it has led to several decades of research in the area of secure multi-party computation. Today, cloud computing serves as a major motivation for the development of secure data processing techniques

    Mar 13, 2014 Read more
  • HD

    Marina Gavrilova, "Machine Intelligence for Biometric and On-Line Security"

    Security research domain has recently witnessed tremendous growth in respect ...

    Security research domain has recently witnessed tremendous growth in respect to all aspects of information access and sharing. There has been notable progress in developing successful approaches to tackle the problem of user authentication. Among those ap

    Mar 6, 2014 Read more
  • HD

    Rahul Potharaju, "Delivering "Always-on" Services Despite Flaky Network Infrastructure"

    As computing shifts to a service-oriented world, a key need ...

    As computing shifts to a service-oriented world, a key need is to deliver an always-on experience to the end-users. However, providing a 24x7x365 available service is challenging because failures are the norm rather than an exception in distributed system

    Feb 27, 2014 Read more
  • HD

    Ed Felten, "Technical Tradeoffs in the NSA's Mass Phone Call Program"

    This talk will examine several technical questions related to the ...

    This talk will examine several technical questions related to the NSA's program that collects data about a substantial fraction of all domestic phone calls. How effective is such a program likely to be in identifying potential terrorists or clearing up fa

    Feb 20, 2014 Read more
  • HD

    Ting-Fang Yen, "Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks"

    As more and more Internet-based attacks arise, organizations are responding ...

    As more and more Internet-based attacks arise, organizations are responding by deploying an assortment of security products that generate situational intelligence in the form of logs. These logs often contain high volumes of interesting and useful informa

    Feb 13, 2014 Read more
  • HD

    Shumiao Wang, "Secure and Private Outsourcing to Untrusted Cloud Servers"

    Storage and computation outsourcing to cloud servers has become very ...

    Storage and computation outsourcing to cloud servers has become very popular due to the large volume of data that needs to be hosted at cloud servers and the intent to employ servers to perform computational work for clients. However, many clients are sti

    Jan 30, 2014 Read more
  • HD

    Marina Kaljurand, "Economic Policy and Cyber Challenges in Estonia"

    Dec 5, 2013 Read more
  • HD

    Muhammad Umer Arshad, "Trust Management for Publishing Graph Data"

    Use of graph-structured data models is on the rise -- ...

    Use of graph-structured data models is on the rise -- in graph databases, in representing biological and healthcare data as well as geographical data. In order to secure graph-structured data, and develop cryptographically secure schemes for graph databas

    Nov 21, 2013 Read more
  • HD

    Randall Brooks, "Cloud Security: How Does Software Assurance Apply"

    It was once said that the last time one had ...

    It was once said that the last time one had full control of their software was right before they released it. This is ever more important as organizations move applications and services into a public cloud to support a mobile lifestyle. Clouds have been d

    Nov 14, 2013 Read more
Loading...