IU CACR Speakers http://www.indiana.edu/~cacr/?news=rss CACR Speaker Series at Indiana University en-us Wed, 31 Dec 1969 19:00:00 -0500 http://blogs.law.harvard.edu/tech/rss A magic generator (Sid Stamm) cacr@indiana.edu cacr@indiana.edu Workshop ./AgendaWorkshop/ A Research Agenda for Privacy and Security of Healthcare Technologies, Professor from Indiana University Mon, 26 Oct 2009 00:00:00 -0400 Fall 2009 TBD2 Peter Grogg, Professor from Thu, 24 Sep 2009 00:00:00 -0400 Fall 2009 TBD Kay Connelly, Associate Professor from Indiana University Thu, 10 Sep 2009 00:00:00 -0400 Fall 2009 TBD ./content/speaker_data/fall_2008/YevgeniyDodis.html Yevgeniy Dodis, Professor from NYU Thu, 06 Nov 2008 00:00:00 -0500 Fall 2008 Are Your Votes Really Counted?: Evaluating the Security of Real-world Electronic Voting Systems ./content/speaker_data/fall_2008/GiovanniVigna.html Giovanni Vigna, Associate Professor from University of California in Santa Barbara Thu, 09 Oct 2008 00:00:00 -0400 Fall 2008 Privacy and Security Policy in a World of Ubiquitous Data ./content/speaker_data/fall_2008/FredCate.html Fred Cate, Distinguished Professor from Indiana University Thu, 11 Sep 2008 00:00:00 -0400 Fall 2008 Malicious Code Analysis ./content/speaker_data/spring_2008/ChristopherKruegel.html Christopher Kruegel, Assistant Professor from Technical University Vienna Thu, 06 Mar 2008 00:00:00 -0500 Spring 2008 Exploiting Online Games ./content/speaker_data/spring_2008/garymcgraw.html Gary McGraw, Author and more from Cigital Fri, 08 Feb 2008 00:00:00 -0500 Spring 2008 Ugly Ducklings ./content/speaker_data/spring_2008/FrankStajano.html Frank Stajano, Senior Lecturer at the Computer Laboratory from University of Cambridge Thu, 17 Jan 2008 00:00:00 -0500 Spring 2008 TBD ./content/speaker_data/fall_2007/DougStinson.html Doug Stinson, Professor of Computer Science from University of Waterloo Thu, 06 Dec 2007 00:00:00 -0500 Fall 2007 DRM and Privacy ./content/speaker_data/fall_2007/NicholasSheppard.html Nicholas Sheppard, Research Fellow from University of Wollongong Thu, 18 Oct 2007 00:00:00 -0400 Fall 2007 Magic Boxes: Hardware-Based Cybersecurity ./content/speaker_data/fall_2007/SeanSmith.html Sean Smith, Associate Professor of Computer Science from Dartmouth College Thu, 13 Sep 2007 00:00:00 -0400 Fall 2007 Tor and China: Design of a blocking-resistant anonymity system ./content/speaker_data/spring_2007/rogerdingledine.html Roger Dingledine, Security and Privacy Researcher from Electronic Frontier Foundation Thu, 11 Jan 2007 00:00:00 -0500 Spring 2007 Secret Handshakes with Dynamic and Fuzzy Matching ./content/speaker_data/spring_2007/MarinaBlanton.html Marina Blanton, Ph.D. student in CS from Purdue University Thu, 08 Feb 2007 00:00:00 -0500 Spring 2007 Learning Where People Have Been Without Knowing Who They Are ./content/speaker_data/spring_2007/LatanyaSweeney.html Latanya Sweeney, Associate Professor of Computer Science from Carnegie Mellon University Thu, 08 Mar 2007 00:00:00 -0500 Spring 2007 The Current State of Phishing Attacks ./content/speaker_data/spring_2007/ZulfikarRamzan.html Zulfikar Ramzan, Sr. Principal Security Researcher from Symantec Corporation Thu, 12 Apr 2007 00:00:00 -0400 Spring 2007 Accessing Services without Learning Where They Are ./content/speaker_data/spring_2007/PaulSyverson.html Paul Syverson, Researcher, Visiting Scholar from US Naval Research Laboratory, Indiana University Thu, 26 Apr 2007 00:00:00 -0400 Spring 2007 Privacy and Security, it isn't Either/Or it's Both/And ./content/speaker_data/fall_2006/joncallas.html Jon Callas, Chief Technology and Security Officer from PGP Corporation Thu, 14 Sep 2006 00:00:00 -0400 Fall 2006 The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond content/speaker_data/fall_2006/aaronemigh.html Aaron Emigh, Executive VP of Technology from Six Apart Thu, 12 Oct 2006 00:00:00 -0400 Fall 2006 Automated Software Vulnerability Remediation and Immunization content/speaker_data/fall_2006/rsekar.html R. Sekar, Professor of Computer Science from Stony Brook University Thu, 09 Nov 2006 00:00:00 -0500 Fall 2006 Mitigating Dictionary Attacks on Password-Protected Local Storage content/speaker_data/fall_2006/shaih.html Shai Halevi, Research Staff Member from IBM T.J. Watson Research Center Thu, 07 Dec 2006 00:00:00 -0500 Fall 2006 An Experimental Study of Denial of Service Attacks ./content/speaker_data/spring_2006/soniafahmy.html Sonia Fahmy, Associate Professor of Computer Science from Purdue University Thu, 12 Jan 2006 00:00:00 -0500 Spring 2006 Semantic Attacks and Security ./content/speaker_data/spring_2006/paulthompson.html Paul Thompson, Ph.D., Research Associate Professor of Computer Science from Dartmouth College Thu, 26 Jan 2006 00:00:00 -0500 Spring 2006 Information Revelation and Privacy in Online Social Networks ./content/speaker_data/spring_2006/alessandroacquisti.html Alessandro Acquisti, Assistant Professor of IT and Public Policy from Heinz School, Carnegie Mellon University Thu, 09 Feb 2006 00:00:00 -0500 Spring 2006 An Overlay-Based Approach to Network Availability ./content/speaker_data/spring_2006/angeloskeromytis.html Angelos Keromytis, Assistant Professor of Computer Science from Columbia University Thu, 09 Mar 2006 00:00:00 -0500 Spring 2006 RFID: The Problems of Cloning and Counterfeiting ./content/speaker_data/spring_2006/arijuels.html Ari Juels, Principal Research Scientist from RSA Laboratories Thu, 13 Apr 2006 00:00:00 -0400 Spring 2006 Tor: Anonymous Communications for the Dept. of Defense... and You ./content/speaker_data/spring_2006/rogerdingledine.html Roger Dingledine, Security and Privacy Researcher from Electronic Frontier Foundation Thu, 20 Apr 2006 00:00:00 -0400 Spring 2006