Section 1
- Capabilities and Security, Zac Walker,
Paper and
Powerpoint
- SMTP, Rakesh Sharma,
Paper and
Powerpoint
- Figerprints, Calvin Shueh,
Paper and
Powerpoint
- Secure Routing in Wireless Sensor Networks, Ajay Kalambur,
Paper and
Powerpoint
- WPA, Abuzar Amini,
Paper and
Powerpoint
- Java Applet Security, Diana Dong,
Paper and
Powerpoint
- WAP and WTLS, Yun Zhou,
Paper and
Powerpoint
- Java Code Obfuscation, Neerja Bhatnagar,
Paper and
Powerpoint
- Hand Geometry, Nithin Reddy,
Paper and
Powerpoint
- Web-based Applications, Kenneth Ton,
Paper and
Powerpoint
- Radius, Hiral Shah and Varsha Mahalingappa,
Paper and
Powerpoint
- WEP, Kavitha Devireddy and Sapna Shankar
Paper and
Powerpoint
- Micropayment Schemes, Jian Dai,
Paper and
Powerpoint
- SYN Flooding: A Denial of Service Attack, Shivani Hashia,
Paper and
Powerpoint
- SSL, Oana Dini,
Paper and
Powerpoint
Section 2
- Gait Recognition, Arshiya Khan,
Paper and
Powerpoint
- CAPTCHA, Annette Tsui,
Paper and
Powerpoint
- PGP, Xiaoheng Wu,
Paper and
Powerpoint
- Network Firewalls, Vincent Ohm,
Paper and
Powerpoint
- Two-way Authentication, David Wang,
Paper and
Powerpoint
- Rsync, David Shao,
Paper and
Powerpoint
- Watermarking, Elo Leung and Wing Wong,
Paper and
Powerpoint
- Mobile Agents for Intrusion Detection, Jaromy Ward,
Paper and
Powerpoint
- Shell Based Intrusion Detection System, Amit Mathur,
Paper and
Powerpoint
- Enigma, Brandon Hunter,
Paper and
Powerpoint
- WPA, Shefali Jariwala,
Paper and
Powerpoint
- Smartcard Security, Xufen Gao,
Paper and
Powerpoint
- Steganography, Leo Lee,
Paper and
Powerpoint
- Trojan Horse, Lori Agrawal,
Paper and
Powerpoint
- Zero Knowledge Proofs, Subha Rajagopalan and Jaisheela Kandagal,
Paper and
Powerpoint
- Wi-Fi, Angus U,
Paper and
Powerpoint