Date |
Name(s) |
|
|
Topic |
Wed 2 May 2012 |
Meixner |
|
|
Steganography |
|
Herzberg |
|
|
VIC cipher |
|
Bednar |
Boeck |
|
RC4 |
Thu 3 May 2012 |
Moravec |
|
|
PlayStation network security breach |
|
Gieske |
|
|
Location privacy in mobile apps |
|
Dykstra |
Edmisson |
|
Kerberos V5 |
Mon 7 May 2012 |
Bryan |
|
|
IPsec |
|
Pelant |
|
|
Ettercap Sniffing tool |
|
O'Callaghan |
Walker |
|
Tor and anonymity networks |
Wed 9 May 2012 |
Grewal |
|
|
Multilateral security |
|
Ebert, A. |
Ebert, B. |
Gradinjan |
Multifactor authentication |
Thu 10 May 2012 |
Humlie |
|
|
RFID security |
|
Ohri |
|
|
Security engineering |
|
Gustafson |
|
|
Unicode security problems |
|
Workman |
|
|
Cryptographic game theory |
Mon 14 May 2012 |
Hendrix |
Tchaikovski |
|
Cyberwarfare |
|
Ponstein |
|
|
Cyberwarfare |
Tue 15 May 2012 |
Kiel |
|
|
Social Engineering |
|
Holm |
Wolff |
|
Social Engineering / Mitnick |
Wed 16 May 2012 |
Wnuk |
|
|
Stuxnet |
|
Calderon |
Rider |
|
Authentication Concerns and the Future of Authentication |