| Date |
Name(s) |
|
|
Topic |
| Wed 2 May 2012 |
Meixner |
|
|
Steganography |
| |
Herzberg |
|
|
VIC cipher |
| |
Bednar |
Boeck |
|
RC4 |
| Thu 3 May 2012 |
Moravec |
|
|
PlayStation network security breach |
| |
Gieske |
|
|
Location privacy in mobile apps |
| |
Dykstra |
Edmisson |
|
Kerberos V5 |
| Mon 7 May 2012 |
Bryan |
|
|
IPsec |
| |
Pelant |
|
|
Ettercap Sniffing tool |
| |
O'Callaghan |
Walker |
|
Tor and anonymity networks |
| Wed 9 May 2012 |
Grewal |
|
|
Multilateral security |
| |
Ebert, A. |
Ebert, B. |
Gradinjan |
Multifactor authentication |
| Thu 10 May 2012 |
Humlie |
|
|
RFID security |
| |
Ohri |
|
|
Security engineering |
| |
Gustafson |
|
|
Unicode security problems |
| |
Workman |
|
|
Cryptographic game theory |
| Mon 14 May 2012 |
Hendrix |
Tchaikovski |
|
Cyberwarfare |
| |
Ponstein |
|
|
Cyberwarfare |
| Tue 15 May 2012 |
Kiel |
|
|
Social Engineering |
| |
Holm |
Wolff |
|
Social Engineering / Mitnick |
| Wed 16 May 2012 |
Wnuk |
|
|
Stuxnet |
| |
Calderon |
Rider |
|
Authentication Concerns and the Future of Authentication |