Presentation
Order for CompSci 725 FC 2001 |
|
|
|
Order |
|
Surname |
First Names |
Paper |
1 |
0.967804 |
Wei |
Zhong |
Chess, "Security Issues in
Mobile Code Systems" (first 8 pp.) |
2 |
0.957479 |
Li |
Jinping |
Bellare et al., "Design …
Electronic Payment System" |
3 |
0.956737 |
Alford |
Mark Leslie |
Cox & Linnartz, "Some
General Methods for Tampering with Watermarks" |
4 |
0.927839 |
Yang |
Weimin |
Aucsmith, "Tamper Resistant
Software: An Implementation" |
5 |
0.889323 |
Liu |
Yi |
Paxson, "Bro: A System for
Detecting Network Intruders in Real-Time" |
6 |
0.882773 |
|
|
(dropped) |
7 |
0.882537 |
Painter |
Matthew Charles |
Lindquist & Jonsson, "A
Map of Security Risks Associated with using COTS" |
8 |
0.82837 |
Hassan |
Halah |
Margrave, "GSM Security and
Encryption" |
9 |
0.808261 |
Liu |
Zisheng |
Girard & Lanet, "New
Security Issues Raised by Open Cards" |
10 |
0.8021 |
Rugg |
Gene Andrew |
Sobe, "Spatial-Domain Image
Watermarking…" |
11 |
0.783212 |
Deng |
Xiao Fei |
Hohl, "Time Limited
Blackbox Security" |
12 |
0.729635 |
Zhang |
Wei |
Krsul & Spafford,
"Authorship Analysis …" |
13 |
0.668534 |
|
|
(dropped) |
14 |
0.632656 |
Shen |
Yu-Chang |
Ousterhout, "The Safe-Tcl
Security Model" |
15 |
0.629781 |
Ihle |
Benjamin Luke |
Cohen, "Operating System
Protection Through Program Evolution" |
16 |
0.609978 |
Ren |
Min |
Garcia-Molina & Shivakumar,
"Safeguarding and Charging for Information …" |
17 |
0.608117 |
Li |
Ming |
Bates, "Fundamentals of
Computer Forensics" |
18 |
0.529476 |
Li |
Yongqiang |
Gong et al., "Signing,
Sealing and Guarding Java Objects" |
19 |
0.522571 |
Stanton |
Craig Alan |
Law, "How to Make a Mint
..." |
20 |
0.514562 |
Zhang |
Mingzeng |
Dowd, "Network Security:
It's Time to Take It Seriously" |
21 |
0.508062 |
Liu |
Jenny |
Drew, Java Security (?) |
22 |
0.398999 |
Cheeseman |
Aaron Julian |
(extract from Computer Forensics
monograph) |
23 |
0.377737 |
Tang |
Jianning |
Ferguson et al., "Improved
Cryptanalysis of Rijndael" |
24 |
0.288463 |
Kurlatov |
Igor N |
Gilmore, "Secure Remote
Access to an Internal Webserver" |
25 |
0.254923 |
Liu |
Zhihui |
Saltzer, "The Protection of
Information in Computer Systems" (?) |
26 |
0.210136 |
Li |
Fajie |
LaDue, "The Maginot
License…" |
27 |
0.195937 |
Lim |
Tang Kok |
Ho, "A Study into the
Problem of Software Piracy" |
28 |
0.14606 |
Naidu |
Roneel Rohiteshwaran |
Devanbu & Stubblebine,
"Software Engineering for Security: A Roadmap" |
29 |
0.133247 |
Derhamy |
Seyed Hosein |
Hunt, "Internet/Intranet
Firewall Security …" |
30 |
0.105557 |
Wu |
Haipeng |
Wallach et al., "Extensible
Security Mechanisms for Java" |
31 |
0.017503 |
West |
Clare Jacqueline |
Hedbom et al, "Analysis of
the Security of Windows NT" (?) |
|
|
|
|
|