|
|
COMPSCI 725 LEC C FS
2003 Paper Assignments |
Paper # |
Topic |
Author |
Student 1 |
Student 2 |
Student 3 |
1 |
WM |
Adelsbach et al., "Zero-Knowledge Watermark Detection and
Proof of Ownership" |
|
|
|
|
|
|
2 |
WM |
Atallah
et al., “Natural Language Watermarking and Tamperproofing” |
Ou, Chaoli |
34 |
|
|
|
3 |
WM |
Benedens, “Robust Watermarking and Affine Registration of 3D
Meshes” |
Lun, Qing-Shan |
2 |
Bagby, Kurt |
17 |
|
|
4 |
WM |
Bern et al., “Trustworthy Paper Documents” |
|
|
|
|
|
|
5 |
WM |
Jensen,
“Fingerprinting Text in Logical Markup Languages” |
Xie, William |
1 |
Wang, Bo(b) |
19 |
Jampana, Sasank |
45 |
6 |
WM |
Yoshiura
et al., “Secure Fingerprinting Using Public-Key Cryptography (Position
Paper)” |
|
|
|
|
|
|
7 |
OBF |
Barak et al., “On the (Im)possibility of Obfuscating Programs
(Extended Abstract)” |
|
|
|
|
|
|
8 |
OBF |
Chow et al., “An approach to the obfuscation of control-flow
of sequential computer programs” |
|
|
|
|
|
|
9 |
OBF |
Jacob et al., “Attacking an obfuscated cipher by injecting
faults” |
Markowitz, Sidney |
7 |
Stay, Mike |
28 |
|
|
10 |
TR |
Aucsmith, “Tamper Resistant Software: An Implementation" |
|
|
|
|
|
|
11 |
TR |
Chen et al., “Oblivious Hashing: A Stealthy Software Integrity
Verification Primitive” |
|
|
|
|
12 |
TR |
Ogiso et al., “Software Tamper Resistance Based on the
Difficulty of Interprocedural Analysis” |
|
|
|
|
13 |
TR |
Wang et al., “Software Tamper Resistance: Obstructing Static
Analysis of Programs” |
|
|
14 |
TR |
Lie
et al., “Architectural support for copy and tamper resistant software” |
Jin, Xing |
18 |
|
15 |
CD |
Wong et al., “Computational
Forensic Techniques for Intellectual Property Protection” |
Mahawatte, Gayani |
25 |
Butters, Diana |
27 |
|
16 |
DRM |
Budd,
“Protecting and Managing Electronic Content with a Digital Battery” |
Lord, John |
32 |
Phillips, Iain |
49 |
|
|
17 |
DRM |
Halderman,
“Evaluating New Copy-Prevention Techniques for Audio CDs” |
Lee, Sau Fan |
14 |
Bolitho, Matthew |
23 |
|
18 |
DRM |
Mana
et al., “An Efficient Software Protection Scheme” |
Guo, Sheng Lin |
30 |
Barrett, Matthew |
40 |
Yang, Xiaodong |
50 |
19 |
DRM |
Maude et al., “Hardware protection against software piracy” |
Liu, Qiang |
35 |
Ramakrishnan, Gayathri |
41 |
|
20 |
DRM |
Schneck,
“Persistent Access Control to Prevent Piracy of Digital Information” |
|
|
|
|
|
|
21 |
DRM |
Zhao, “A WWW service to embed and prove digital copyright
watermarks” |
|
|
22 |
SS |
Armington
et al., “Biometric Authentication in Infrastructure Security” |
Stilinovic, Ana |
44 |
Dewan, Anupam |
46 |
|
23 |
SS |
Beneš, “The
Strong Eternity Service,” |
Zhou, Sylvia |
15 |
|
|
24 |
SS |
Boldyreva
et al., “Theft protected proprietary certificates” |
|
|
|
|
25 |
SS |
Canvel,
“Password Interception in a SSL/TLS Channel,” |
Zhang, Honglei |
13 |
Rambach, Franz |
42 |
Stoeckigt, Kewin |
48 |
26 |
SS |
De Clercq,
“Single Sign-On Architectures” |
|
|
|
|
|
|
27 |
SS |
Ellison, “The Trust Shell Game (Position Paper)” |
Karl, Gareth |
29 |
Poh, Jerrold |
36 |
|
28 |
SS |
Mallard,
“E-Government: Authentication of Identity” |
Mehra, Akhil |
21 |
Dinakarn, Gopi |
37 |
|
|
29 |
SS |
Yahalom,
“Optimistic Trust with Realistic eNvestigators” |
|
|
|
|
|
|
30 |
PROT |
Gollmann, “Insider
Fraud” |
|
|
|
|
|
|
31 |
NET |
McHugh,
“Intrusion and Intrusion Detection” |
Chan, Tak |
8 |
Lu, Hao |
9 |
Peng, Po-Yuan |
24 |
32 |
NET |
Nikander, “Denial-of-Service, Address Ownership, and Early
Authentication in the IPv6 World” |
Vutukuri, Aditya |
4 |
Carpenter, Craig |
20 |
Yap, Nelson Yuen |
52 |
33 |
NET |
Tan
et al., “Hiding Intrusions: From the Abnormal to the Normal and Beyond” |
|
|
|
|
|
|
34 |
APP |
Bond et
al., “Decimalisation Table Attacks for PIN Cracking” |
Chai, Carvin |
26 |
Sun, Ji |
31 |
Yang, Rui |
39 |
35 |
APP |
Clulow, “The Financial Cryptographic API” |
|
|
|
|
|
|
36 |
APP |
Landwehr, “Computer
Security” |
|
|
|
|
|
|
37 |
APP |
Lee et al., “Learning Fingerprints for a Database Intrusion
Detection System” |
Huang, Yuman |
5 |
Wang, Lixin |
6 |
Vinkovska, Irena |
11 |
38 |
APP |
Reifer
et al., “Estimating the Cost of Security for COTS Software.” |
|
|
|
|
|
|
39 |
APP |
Somayaji and S. Forrest, “Automated Response Using System-Call
Delays." |
|
|
|
|
|
|
40 |
APP |
Yoshiura et al., “A Multi-OS Approach to Trusted Computer
Systems” |
Pearson, Kenji |
33 |
Anand, Sandeep |
54 |
|
|
41 |
WM |
Venkatesan,
V Vazirani, S Sinha, “A Graph Theoretic Approach to Software
Watermarking” |
|
|
|
|
|
|
42 |
|
Bechtold, "From Copyright to Information Law -
Implications of Digital Rights Management" |
|
|
|
|
|
|
43 |
|
van Eck, "Electomagnetic Radiation from Video Display
Units: An Eavesdropping Risk" |
Johnson, Adam |
3 |
Shotbolt, Paul |
12 |
Cheung, Alex |
16 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Unassigned: |
Crockett, Anne |
43 |
|
|
|
|
|
|
|
Zhen, Wei Xue |
47 |
|
|
|
|
|
|
|
Xia, Lu |
51 |
|
|
|
|
|
|
|
Reddy, Adavalli |
53 |
|
|
|
|
|
|
|
|
|
|