1.
Digital Forensics. Kota Jitendra Sai, George,Nithin Tom, Mainuddin,Md (3/29)
2.
Steganography.
Brandon Hillan, Robert Massicotte, Steven Williams (4/12)
3.
DOS (& DDOS) Attacks and Prevention . WeiqiWang, Yilin Wang, Yu Zhang (3/31)
4.
Public Key Infrastructure. Abhishek Chennaka, Monika Mudireddy, Ashish Kumar Mekala (4/5)
5.
Social Engineering. Harsha Peswani, Ishwarya Selvapandian (4/12)
6.
Public Key Infrastructure—Risk Analysis. Akila Santhoshi Vegesna, Harish Mandava (3/25)
7.
SHA 3, background + implementation. Becky Powell, Elliot Mudrick, Jacob Knoblauch (4/12)
8.
Quantum Computers.
Emil Djerekarov, Kunal SighaRoy and Monika Arora (4/14)
9.
Bitcoin–crypto currency. Vigneshwar Padmanaban, Mourya Kodidela, Vishav Pandhi (4/12)
10.
Encrypting file systems. Nick Donnel, Ibrahim Attiya (3/25)
11.
Critical Infrastructure Protection.
12.
Social Media Security.
13.
Internet Security.
14.
Database Security.
15.
Trust Management (TPM, TNC).
16.
Phishing, defacing and other threats.
17.
Computer Forensics.
18.
Vulnerability Analysis in the implementation of crypto.
19.
Biometric Crypto.
20.
Sensor Networks.
21.
How to run TM on encrypted data
22.
Public Key Crypto for WSN, ID based Crypto.
23.
Encrypted filesystems, using cryptographic techniques to secure filesystems
24.
Cryptographic Attacks
25.
Advanced Persistent Threats
26.
Critical Infrastructure resiliency
27.
Trusted Computing.
28.
Elliptic Curves
29.
SSL
30.
Smart Grids, resiliency
31.
Merkle Trees
32.
PGP,
33.
Visual Cryptography
1. Email your grades to the TA
2. You must attend a presentation to grade it.
3. Each presentation is graded 1-10.
4. The final grade will take into account the written report as well.