COMPSCI 725 S2C 04 Term Papers
Mingfeng Bao
Improved data confidentiality: an overview of NGSCB
Brendan Sean Cervin
Review of Security Requirements Engineering Processes
Michael Alan Cochrane
VPN Access for mobile users: IPSec or SSL?
Siriwat Karndacharuk
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Corinne Alison Lawrence
Intrusion Prevention Systems: The Future of Intrusion Detection?
Cho Hong Ling
Internet Firewall Vulnerability Analysis Method
Zheng Liu
Microsoft .NET Passport, a solution of single sign on
Zhichao Liu
Defenses Against DDoS Attacks With Multiple IDSs Using Network Stream Splitting
Zhengyuan Luo
Two SSO Architectures with a Single Set of Credentials
Praveen Mandava
E-Voting (in)Security
Paul Richard Mason
An Intellectual Property Threat Analysis of a .NET Windows Application
Christopher John Mills
Investigation of Defences Against Cross Site Scripting Attacks
Christian Hagensen Mosveen
Why VPN Alone Will not Secure your Wireless Network
Sandeep Mudana
Security Flaws in Internet Voting System
Richard Allen Paul
Verifying the Integrity of Shared Libraries
Teng Teng
Analyzing the vulnerability of a certain Reputation-Based Trust Management for P2P Networks
Lei Wang
Fight against spyware on two laptops
Yijie Yang
Raw Quick Pairs method of detecting Stego-images
Cheung-Ling-Kelly Yu
A Case study on PKI: SERVE
Bojan Zdrnja
Second-generation (GenII) honeypots