Tue 08 May 2007 |
Chavers |
RFID: Privacy vs. Security |
|
Atwood |
RFID Biometric Data |
|
Riggs |
Mass Identification and Authorization Processes vs. Privacy
and Anonymity |
Bailey |
Hard Disk Encryption |
Thu 10 May 2007 |
Heinritz |
Fingerprint Identification |
|
Mertz |
Biometrics Overview |
|
Kaemmer |
Biometric Identification Cards |
|
Cvetan |
Biometric Identification: Retina and Iris Methods |
Fri 11 May 2007 |
Winkler |
Windows Vista Security |
|
Footit |
Windows Vista User Account Control (UAC) |
|
Beetcher |
Key Logging in Windows XP |
|
Mischock |
DVD Encryption |
Tue 15 May 2007 |
Geboy |
Java Cryptography
Architecture |
|
Hammel |
Elliptic Curve Cryptography |
|
Phillips |
Rainbow Tables |
Thu 17 May 2007 |
Handl |
Online Banking Authentication |
|
Marg |
Honey Pots |
|
Skibinski |
VLANs |
Fri 18 May 2007 |
Patterson |
Insiders Who Threaten Security |
|
Heck |
File system security |
|
Musick |
Security in Cellular Phones |
|
|
|
|