Skip to main content

2016 Events

Secure and Scalable Attestation: On Building Trust in IoT Systems

Secure and Scalable Attestation: On Building Trust in IoT Systems

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Advances in Smartphone Security: Attacks, Defenses, and Applications

Advances in Smartphone Security: Attacks, Defenses, and Applications

Dr. Alexandra Dmitrienko - Postdoctoral Researcher ...
A Brief Introduction to Succinct Data Structures and Text Indexing

A Brief Introduction to Succinct Data Structures and Text Indexing

Dr. Sharma Thankachan - Georgia Institute of Technology ...
Improved Genetic Operators for Path Planning

Improved Genetic Operators for Path Planning

Dr. David Mathias - Florida Southern College ...
Efficiently Searching Among Sensitive Content

Efficiently Searching Among Sensitive Content

Dr. Douglas W. Oard - University of Maryland ...
Design Engineering to Overcome Unwanted Replacement (DETOUR)

Design Engineering to Overcome Unwanted Replacement (DETOUR)

Dr. Laurent Njilla - U.S. Air Force Research Laboratory ...
Things, Trouble, Trust: On Building Trust in IoT Systems

Things, Trouble, Trust: On Building Trust in IoT Systems

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
User Expectations in Mobile App Security

User Expectations in Mobile App Security

Dr. Tao Xie - University of Illinois at Urbana-Champaign ...
Achieving Photoreal Digital Actors

Achieving Photoreal Digital Actors

Dr. Paul Debevec - University of Southern California ...
Toward Personalized Visualizations

Toward Personalized Visualizations

Alvitta Ottley - Tufts University ...
Approximate Sequence Matching: Algorithms and Applications

Approximate Sequence Matching: Algorithms and Applications

Dr. Sharma V. Thankachan - Georgia Institute of Technology ...
A Layered Solution to Cybersecurity

A Layered Solution to Cybersecurity

Dr. Erfan Ibrahim - National Renewable Energy Lab ...
Everything You Code Can and Will Be Re-Used Against You

Everything You Code Can and Will Be Re-Used Against You

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Big Data Security and Privacy

Big Data Security and Privacy

Dr. Elisa Bertino - Purdue University ...
Quantitative Analysis of Stepping Stone Access to Cyber-Physical Assets

Quantitative Analysis of Stepping Stone Access to Cyber-Physical Assets

Dr. David M. Nicol - University of Illinois at Urbana-Champaign ...