CERIAS Weekly Security Seminar - Purdue University
1,160 episodes - English - Latest episode: 20 days ago - ★★★★ - 6 ratingsCERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discovery, a case studies or exploring cyber operational approaches; they are not product demonstrations, service sales pitches, or company recruitment presentations. Join us weekly...or explore 25 years of archives for the who's-who in cybersecurity.
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Episodes
James R. C. Hansen, "Computer Forensics Examinations in the Consulting Arena"
October 29, 1999 20:30 - 253 MB VideoAs use of information technology continues to expand, the need to identify and preserve electronic evidence becomes a paramount. Once strictly the domain of law enforcement agencies, computer forensic examination has become a common part of litigation. Mr. Hansen will discuss a evolution of computer forensics, some of the ongoing legal and technical challenges that face a service provider in this area. Mr. Hansen will review a number of recent cases, and identify current trends in thi...
James R. C. Hansen, Computer Forensics Examinations in the Consulting Arena
October 29, 1999 20:30 - 1 hour - 253 MB VideoAs use of information technology continues to expand, the need to identify and preserve electronic evidence becomes a paramount. Once strictly the domain of law enforcement agencies, computer forensic examination has become a common part of litigation. Mr. Hansen will discuss a evolution of computer forensics, some of the ongoing legal and technical challenges that face a service provider in this area. Mr. Hansen will review a number of recent cases, and identify current trends in this area. ...
David Aucsmith, Balancing Big Brother
October 15, 1999 20:30 - 1 hour - 374 MB VideoThis talk addresses the issue of reconciling the needs of law enforcement and national security with the continuing evolution of computer and communications technology. It will describe the needs of both the law enforcement and national security communities including their current technical requirements and solutions. It will then describe technological trends and show how technical imperatives will render current solutions ineffective. It concludes with a description of possible directions t...
David Aucsmith, "Balancing Big Brother"
October 15, 1999 20:30 - 374 MB VideoThis talk addresses the issue of reconciling the needs of law enforcement and national security with the continuing evolution of computer and communications technology. It will describe the needs of both the law enforcement and national security communities including their current technical requirements and solutions. It will then describe technological trends and show how technical imperatives will render current solutions ineffective. It concludes with a description of possible dire...
Edward J. Delp, Image and Video Watermarking: An Overview
September 10, 1999 20:30 - 1 hour - 246 MB VideoIn the past several years there has been an explosive growth in digital imaging technology and applications. Digital images and video are now widely distributed on the Internet and via CD-ROM. One problem with a digital image is that an unlimited number of copies of an "original" can be easily distributed and/or forged. This presents problems if the image is copyrighted. The protection and enforcement of intellectual property rights has become an important issue in the "digital world." Many a...
Edward J. Delp, "Image and Video Watermarking: An Overview"
September 10, 1999 20:30 - 246 MB VideoIn the past several years there has been an explosive growth in digital imaging technology and applications. Digital images and video are now widely distributed on the Internet and via CD-ROM. One problem with a digital image is that an unlimited number of copies of an "original" can be easily distributed and/or forged. This presents problems if the image is copyrighted. The protection and enforcement of intellectual property rights has become an important issue in the "digital world....
Gene Spafford, Twelve Challenges in Information Security Research
September 03, 1999 20:30 - 1 hour - 263 MB VideoCurrent research in information security at many labs are largely focused on traditional themes: firewalls, intrusion detection, cryptography, and computer viruses. However, there are other challenges that need to be addressed to provide a basis for protecting our information infrastructure. About the speaker: Spaf is the Director of CERIAS and is a noted researcher and iconoclast. A more comprehensive vita is available online.
Gene Spafford, "Twelve Challenges in Information Security Research"
September 03, 1999 20:30 - 263 MB VideoCurrent research in information security at many labs are largely focused on traditional themes: firewalls, intrusion detection, cryptography, and computer viruses. However, there are other challenges that need to be addressed to provide a basis for protecting our information infrastructure.
Clay Shields, KHIP - A Scalable Protocol for Secure Multicast Routing
August 27, 1999 20:30 - 46 minutes - 171 MB VideoMulticast routing is a service that provides for efficient many-to-many communication in a network. Traditionally, secure multicast protocols have used existing multicast routing services and relied on cryptographic protection of the messages sent to provide security. Much previous work in the area has been on methods of establishing a shared key between members subscribing to the multicast group. Some problems with this approach are that any network member can receive the encrypted traffic, ...
<a href="http://www.cs.georgetown.edu/~clay/">Clay Shields</a>, "KHIP - A Scalable Protocol for Secure Multicast Routing"
August 27, 1999 20:30 - 171 MB VideoMulticast routing is a service that provides for efficient many-to-many communication in a network. Traditionally, secure multicast protocols have used existing multicast routing services and relied on cryptographic protection of the messages sent to provide security. Much previous work in the area has been on methods of establishing a shared key between members subscribing to the multicast group. Some problems with this approach are that any network member can receive the encrypted t...