COMPSCI 725 FC 03 Term Papers

 

The following students have given permission for their term paper to be posted to this website.  All other publication rights (including the moral right of the author to be identified as such) are reserved.

 

  1. Surender Reddy Adavalli, “Smart Card Solution: Highly secured Java Card Technology”.
  2. Sandeep Anand, “Incorporating Biometrics and Smart Cards”.
  3. Kurt Bagby, “Taking Computer Virus Detection to a New Level”.
  4. Matthew Barrett, “Secure Multimedia Content Delivery to the Home via the Internet”.
  5. Diana Butters, “Comparison of Matching Algorithm Used in Three Plagiarism Detection Systems”.
  6. Anupam Dewan, “Enhancing Biometric Authentication with Data Protection”.
  7. Gopi Dinakaran, “Fail-Stop Signature Scheme for Digital Payment”.
  8. Yuman Huang, “Safeguarding a Native XML Database System”.
  9. Sasank Jampana, “Semantic Watermarking of Plain Text”.
  10. Adam Johnson, “Protecting Free Speech using the Eternity Service”.
  11. Gareth Karl, “A Probabilistic Trust Model”.
  12. Sau Fan LEE, “Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks”.
  13. Qiang Liu, “Techniques Using Exterior Component Against Software Piracy”.
  14. Qing-Shan Martin Lun, “A Survey of Three Proposed Techniques to Increase the Security of Java”.
  15. Sidney Markowitz, “User and Process Identity in Access Control”.
  16. Akhil Mehra, “Methods of Securing the Bootstrap Process of an Operating System”.
  17. ChaoLi Ou, “Text Watermarking for Text Document Copyright Protection”.
  18. Iain Phillips, “Hardware-Based Methods for Prevention of Multimedia Piracy: Some Issues”.
  19. Po-yuan Peng, “Intrusion Detection System at Operating System Level”.
  20. Jerrold Poh, “Managing Trust: Real World Examples”.
  21. Franz Rambach, “Taxonomies of Attackers”.
  22. Paul Shotbolt, “Several Compromising-Emanations Based Interception Techniques and Their Implications”.
  23. Mike Stay, “Cards vs. Shuffling”.
  24. Ji SUN, “Is Decimalisation Table Attack Really a Major Threat?”.
  25. Aditya Vutukuri, “Frequent Denial of Service Attacks”.
  26. Lixin Wang, “Artificial Neural Network for Anomaly Intrusion Detection”.
  27. William Xie, “Smart Card and its Application in Software Protection”.
  28. Xiaodong yang, “Protecting Mobile Agent against Malicious Hosts Using A Time-Limited Blackbox Approach”.
  29. Hong lei Zhang, “Three attacks in SSL protocol and their solutions”.