COMPSCI 725 FC 03 Term Papers
The following students have given
permission for their term paper to be posted to this website. All other publication rights (including the
moral right of the author to be identified as such) are reserved.
- Surender
Reddy Adavalli, “Smart Card Solution: Highly
secured Java Card Technology”.
- Sandeep
Anand, “Incorporating Biometrics and Smart Cards”.
- Kurt
Bagby, “Taking Computer Virus Detection to a New
Level”.
- Matthew
Barrett, “Secure Multimedia Content Delivery to
the Home via the Internet”.
- Diana
Butters, “Comparison of Matching Algorithm Used in
Three Plagiarism Detection Systems”.
- Anupam
Dewan, “Enhancing Biometric Authentication with
Data Protection”.
- Gopi
Dinakaran, “Fail-Stop Signature Scheme for
Digital Payment”.
- Yuman
Huang, “Safeguarding a Native XML Database System”.
- Sasank
Jampana, “Semantic Watermarking of Plain Text”.
- Adam
Johnson, “Protecting Free Speech using the
Eternity Service”.
- Gareth
Karl, “A Probabilistic Trust Model”.
- Sau
Fan LEE, “Analysis on Some Defences against SYN-Flood
Based Denial-of-Service Attacks”.
- Qiang
Liu, “Techniques Using Exterior Component Against
Software Piracy”.
- Qing-Shan
Martin Lun, “A Survey of Three Proposed Techniques to
Increase the Security of Java”.
- Sidney
Markowitz, “User and Process Identity in
Access Control”.
- Akhil
Mehra, “Methods of Securing the Bootstrap Process
of an Operating System”.
- ChaoLi
Ou, “Text Watermarking for Text Document Copyright
Protection”.
- Iain
Phillips, “Hardware-Based Methods for Prevention
of Multimedia Piracy: Some Issues”.
- Po-yuan
Peng, “Intrusion Detection System at Operating
System Level”.
- Jerrold
Poh, “Managing Trust: Real World Examples”.
- Franz
Rambach, “Taxonomies of Attackers”.
- Paul
Shotbolt, “Several Compromising-Emanations Based
Interception Techniques and Their Implications”.
- Mike
Stay, “Cards vs. Shuffling”.
- Ji
SUN, “Is Decimalisation Table Attack Really a Major
Threat?”.
- Aditya
Vutukuri, “Frequent Denial of Service Attacks”.
- Lixin
Wang, “Artificial Neural Network for Anomaly
Intrusion Detection”.
- William
Xie, “Smart Card and its Application in Software
Protection”.
- Xiaodong
yang, “Protecting Mobile Agent against Malicious
Hosts Using A Time-Limited Blackbox Approach”.
- Hong
lei Zhang, “Three attacks in SSL protocol and their
solutions”.