Oral Presentations |
Order |
Name |
Excerpt Due |
Presentation |
First Author, Title of Article |
2 |
Cao |
Shuping |
27-Mar-02 |
5-Apr-02 |
Jakobsson, “Security Weaknesses in
Bluetooth” |
2.5 |
Lai |
Benjamin Sze
Ting |
27-Mar-02 |
5-Apr-02 |
Sirbu, “Distributed authentication
in Kerberos using public key cryptography" |
3 |
Yip |
Michael Chun
Long |
27-Mar-02 |
9-Apr-02 |
Craver, “Resolving Rightful
Ownerships with Invisible Watermarking Techniques…" |
4 |
Chen |
Yanqiang |
27-Mar-02 |
9-Apr-02 |
Chang, “Protecting Software Code
by Guards” |
5 |
Chen |
Lixi |
27-Mar-02 |
10-Apr-02 |
Wang, “Software Tamper Resistance:
Obstructing Static Analysis of Programs” |
6 |
Balakistareddy |
Swetha |
10-Apr-02 |
16-Apr-02 |
Cohen, “Computer Viruses – Theory
and Experiments" |
7 |
Chin |
Siu Fung |
10-Apr-02 |
16-Apr-02 |
Parks, “Vulnerabilities of
Reliable Multicast Protocols" |
8 |
Cronin |
Gareth George |
10-Apr-02 |
19-Apr-02 |
Jakobsson, “Discouraging Software
Piracy Using Software Aging” |
9 |
Hong |
Seung Ki |
10-Apr-02 |
19-Apr-02 |
Stern, "Robust Object
Watermarking: Application to Code" |
10 |
Chen |
Xiaoyu |
10-Apr-02 |
30-Apr-02 |
Feigenbaum, “Privacy Engineering
for Digital Rights Management Systems” |
11 |
Siu |
Cho Jun |
10-Apr-02 |
30-Apr-02 |
Miller, “Playing Inside the Black Box: Using
Dynamic Instrumentation...” |
12 |
Yan |
Min |
19-Apr-02 |
1-May-02 |
Horne, “Dynamic Self-Checking
Techniques for Improved Tamper Resistance” |
13 |
Chan |
Cheuk Fun |
19-Apr-02 |
1-May-02 |
Bond, “API-Level Attacks on
Embedded Systems” |
14 |
Zhao |
Dejin |
19-Apr-02 |
3-May-02 |
Palsberg, "Experience with
Software Watermarking" |
16 |
Mostafa |
Shareef
Ismail |
8-May-02 |
14-May-02 |
Greenberg, “Easter Egg Insertion,
Detection and Deletion in Commercial Software” |
17 |
Manoonpong |
Songpol |
8-May-02 |
14-May-02 |
Anderson, “Low Cost Attacks on
Tamper Resistant Devices” |
19 |
Lin |
Xiang |
8-May-02 |
15-May-02 |
Sander, “Towards Mobile
Cryptography” |
19.5 |
Luo |
Fenghui |
8-May-02 |
15-May-02 |
Landwehr, “A Taxonomy of Computer
Program Security Flaws” |
20 |
Thoren |
Stefan Anders |
17-May-02 |
22-May-02 |
McGraw, “Twelve Rules for
Developing More Secure Java Code” |
21 |
Derhamy |
Hosein |
17-May-02 |
22-May-02 |
Berthold, “Identity Management
Based on P3P" |
22 |
Purnomo |
Eddy |
17-May-02 |
24-May-02 |
Arbaugh, “Your 802.11 Wireless
Network Has No Clothes" |
23 |
Jin |
Weiguo |
17-May-02 |
24-May-02 |
Kephart, "Directed-Graph
Epidemiological Models of Computer Viruses" |
25 |
Yang |
Gene |
22-May-02 |
29-May-02 |
Davis, “Compliance Defects in
Public-Key Cryptography” |
26 |
Bannatyne |
Oliver Simon |
22-May-02 |
28-May-02 |
Greenleaf, "An Endnote on
Regulating Cyberspace: Architecture vs Law" |
27 |
Tan |
Haiying |
22-May-02 |
31-May-02 |
Gray, "D'Agents: Security in
a Multiple-Language, Mobile-Agent System" |
28 |
Raghuram |
Vijapurapu |
22-May-02 |
31-May-02 |
Wallach, “SAFKASI: A Security
Mechanism for Language-based Systems” |
|
|
|
|
|
|