The 25th annual (1999-2024) CERIAS Security Symposium will bring together researchers, scientists, academics, and industry professionals to hear prestigious keynote addresses, thought provoking panel ...
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.
Oblivious Message Retrieval is designed to protect the privacy of users who retrieve messages from a bulletin board. Our work, HomeRun, stands out by providing unlinkability across multiple requests ...
Abstract: This is a patch for Alec Muffett's Crack 5.0 to work on NT's DES and MD4-based hash algorithms. Includes a short README, the patch itself, source code for crypt_lanman and crypt_ntpass (a la ...
Associate Professor; Director of Ubiquitous and Mobile Investigative Techniques and Technologies Lab Ph.D. (Computer Science), Florida State University, 2015. M.S. (Computer Science), Florida State ...
The consequences of a class of system failures, commonly known as software vulnerabilities, violate security policies. They can cause the loss of information and reduce the value or usefulness of the ...
Shanti S. Gupta Distinguished Professor of Statistics; Professor of Computer Science (Courtesy) 2 Wilcoxon Prizes and Youden Prize from Technometrics, Fellow of American Statistical Association, ...
The Center for Education and Research in Information Assurance and Security (CERIAS), a cross-cutting institute at Purdue University, is the world’s foremost interdisciplinary academic center for ...
Subsumed by CERIAS in 1999, COAST (Computer Operations, Audit, and Security Technology) was a multiple project computer security research laboratory in Purdue's computer science department. Like ...
A space-filling curve is a way of mapping the multi-dimensional space into the 1-D space. It acts like a thread that passes through every cell element (or pixel) in the D-dimensional space so that ...
My research interest lies in the area of Computer Security. My primary focus is in the field of security of mobile devices. In particular, I am interested in identifying novel security issues in these ...
This site provides the comprehensive list of resources associated with Internet firewalls. The list is divided into sections to make finding information easier. Much of the information presented here ...