Zhong Xia Ma | Insider Threats Assessment in the Real-World System | |||
Gavin Grant Neale | Investigating the Feasibility of Keyboard Acoustic Attacks | |||
Eugene Phan Hin Min | Biometrics: Application in Cryptographic Signatures | |||
Chi Yuen | A Framework for Legal Analysis of DRM Systems: Copyright and Privacy | |||
Hong Zhou | Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0 | |||
Note: If you were a student in COMPSCI 725 S2 06, and you would like your termpaper to be published here, please send email to cthombor@cs. |