| Oral Presentations | |||||
| Order | Name | Excerpt Due | Presentation | First Author, Title of Article | |
| 2 | Cao | Shuping | 27-Mar-02 | 5-Apr-02 | Jakobsson, “Security Weaknesses in Bluetooth” |
| 2.5 | Lai | Benjamin Sze Ting | 27-Mar-02 | 5-Apr-02 | Sirbu, “Distributed authentication in Kerberos using public key cryptography" |
| 3 | Yip | Michael Chun Long | 27-Mar-02 | 9-Apr-02 | Craver, “Resolving Rightful Ownerships with Invisible Watermarking Techniques…" |
| 4 | Chen | Yanqiang | 27-Mar-02 | 9-Apr-02 | Chang, “Protecting Software Code by Guards” |
| 5 | Chen | Lixi | 27-Mar-02 | 10-Apr-02 | Wang, “Software Tamper Resistance: Obstructing Static Analysis of Programs” |
| 6 | Balakistareddy | Swetha | 10-Apr-02 | 16-Apr-02 | Cohen, “Computer Viruses – Theory and Experiments" |
| 7 | Chin | Siu Fung | 10-Apr-02 | 16-Apr-02 | Parks, “Vulnerabilities of Reliable Multicast Protocols" |
| 8 | Cronin | Gareth George | 10-Apr-02 | 19-Apr-02 | Jakobsson, “Discouraging Software Piracy Using Software Aging” |
| 9 | Hong | Seung Ki | 10-Apr-02 | 19-Apr-02 | Stern, "Robust Object Watermarking: Application to Code" |
| 10 | Chen | Xiaoyu | 10-Apr-02 | 30-Apr-02 | Feigenbaum, “Privacy Engineering for Digital Rights Management Systems” |
| 11 | Siu | Cho Jun | 10-Apr-02 | 30-Apr-02 | Miller, “Playing Inside the Black Box: Using Dynamic Instrumentation...” |
| 12 | Yan | Min | 19-Apr-02 | 1-May-02 | Horne, “Dynamic Self-Checking Techniques for Improved Tamper Resistance” |
| 13 | Chan | Cheuk Fun | 19-Apr-02 | 1-May-02 | Bond, “API-Level Attacks on Embedded Systems” |
| 14 | Zhao | Dejin | 19-Apr-02 | 3-May-02 | Palsberg, "Experience with Software Watermarking" |
| 16 | Mostafa | Shareef Ismail | 8-May-02 | 14-May-02 | Greenberg, “Easter Egg Insertion, Detection and Deletion in Commercial Software” |
| 17 | Manoonpong | Songpol | 8-May-02 | 14-May-02 | Anderson, “Low Cost Attacks on Tamper Resistant Devices” |
| 19 | Lin | Xiang | 8-May-02 | 15-May-02 | Sander, “Towards Mobile Cryptography” |
| 19.5 | Luo | Fenghui | 8-May-02 | 15-May-02 | Landwehr, “A Taxonomy of Computer Program Security Flaws” |
| 20 | Thoren | Stefan Anders | 17-May-02 | 22-May-02 | McGraw, “Twelve Rules for Developing More Secure Java Code” |
| 21 | Derhamy | Hosein | 17-May-02 | 22-May-02 | Berthold, “Identity Management Based on P3P" |
| 22 | Purnomo | Eddy | 17-May-02 | 24-May-02 | Arbaugh, “Your 802.11 Wireless Network Has No Clothes" |
| 23 | Jin | Weiguo | 17-May-02 | 24-May-02 | Kephart, "Directed-Graph Epidemiological Models of Computer Viruses" |
| 25 | Yang | Gene | 22-May-02 | 29-May-02 | Davis, “Compliance Defects in Public-Key Cryptography” |
| 26 | Bannatyne | Oliver Simon | 22-May-02 | 28-May-02 | Greenleaf, "An Endnote on Regulating Cyberspace: Architecture vs Law" |
| 27 | Tan | Haiying | 22-May-02 | 31-May-02 | Gray, "D'Agents: Security in a Multiple-Language, Mobile-Agent System" |
| 28 | Raghuram | Vijapurapu | 22-May-02 | 31-May-02 | Wallach, “SAFKASI: A Security Mechanism for Language-based Systems” |