Section 1 (4 PM, L100) Section 2 (11 AM, CC35)
People Name(s) Topic People Name(s) Topic
Mon 10 May 2010 3 Galba, Greguska, & Senkbeil Wireless security 1 Neidinger Cloud Computing
  2 Goral & Soddy RFID Security 1 Holtz Social Engineering
        1 Pordon Malware Obfuscation
Wed 12 May 2010 2 Eckel & Seifi Biometric Security 1 Marsch SELinux
  3 Brayshaw, Cavanagh, & McBride DRM 2 Banducci & Cochrane Bluetooth Security Flaws
Thu 13 May 2010 1 Rasmussen Cross-Site Request Forgery (CSRF) 2 Oldroyd & Schwartz TrueCrypt
  1 Gartmann AES 2 Martin, Z. & Molling SSL/TLS
  3 Boerner, Curtis, & Dhiman(2) Microsoft Windows Security      
Mon 17 May 2010 3 Hicks, Mueller, & Shrago Windows 7 Security 2 Anderson & Bowman Steganography 
  1 Martin, K. DoD Networks: SIPRNet & NIPRNet 2 Domacinovich & Gillmann Government Code Breaking
Wed 19 May 2010 2 Kappel & Kraft SAS 70 1 Radtke Identity Management Systems
  2 Dietel & Van Dehy Social Engineering 1 Yamat Computer illiteracy and security
        2 Entinger & Michel Market Impacts of Vulnerabilities
Thu 20 May 2010 1 Dettmering Cybercrime Prevention Methods 3 Kuck(1), Emmer, & Guthrie Economics of Information Security
  3 Harker, Krytkowski, & Wanke Psychology of Security 1 De Young IPSec