|
Section 1 (4 PM,
L100) |
Section 2 (11
AM, CC35) |
|
People |
Name(s) |
Topic |
People |
Name(s) |
Topic |
Mon 10 May
2010 |
3 |
Galba, Greguska, & Senkbeil |
Wireless security |
1 |
Neidinger |
Cloud Computing |
|
2 |
Goral & Soddy |
RFID Security |
1 |
Holtz |
Social Engineering |
|
|
|
|
1 |
Pordon |
Malware Obfuscation |
Wed 12 May
2010 |
2 |
Eckel & Seifi |
Biometric Security |
1 |
Marsch |
SELinux |
|
3 |
Brayshaw, Cavanagh, & McBride |
DRM |
2 |
Banducci & Cochrane |
Bluetooth Security Flaws |
Thu 13 May
2010 |
1 |
Rasmussen |
Cross-Site Request Forgery (CSRF) |
2 |
Oldroyd & Schwartz |
TrueCrypt |
|
1 |
Gartmann |
AES |
2 |
Martin, Z. & Molling |
SSL/TLS |
|
3 |
Boerner, Curtis, & Dhiman(2) |
Microsoft Windows Security |
|
|
|
Mon 17 May 2010 |
3 |
Hicks, Mueller, & Shrago |
Windows 7 Security |
2 |
Anderson & Bowman |
Steganography |
|
1 |
Martin, K. |
DoD Networks: SIPRNet & NIPRNet |
2 |
Domacinovich & Gillmann |
Government Code Breaking |
Wed 19 May 2010 |
2 |
Kappel & Kraft |
SAS 70 |
1 |
Radtke |
Identity Management Systems |
|
2 |
Dietel & Van Dehy |
Social Engineering |
1 |
Yamat |
Computer illiteracy and security |
|
|
|
|
2 |
Entinger & Michel |
Market Impacts of Vulnerabilities |
Thu 20 May 2010 |
1 |
Dettmering |
Cybercrime Prevention Methods |
3 |
Kuck(1), Emmer, & Guthrie |
Economics of Information Security |
|
3 |
Harker, Krytkowski, & Wanke |
Psychology of Security |
1 |
De Young |
IPSec |
|
|
|
|
|
|
|