University of Padua - MSc in Computer Science
Computer and Network Security
Academic Year: 2012/2013

Lecturer: Mauro Conti



Topics

Topic selection starts on April 26 at 2pm
(see more info on the course Google group)


Topic 1: RFID Security
Topic 2: Captcha
Topic 3: Untrusted Storage
Topic 4: SmartPhone Security
Topic 5: Password Protection
Topic 6: Distributed Denial of Service Attacks
Topic 7: Sybil Attacks
Topic 8: Behavioural Biometrics
Topic 9: VoIP Security
Topic 10: Secure Content Delivery
Topic 11: Anonymous Communications
Topic 12: Keyloggers Detection
Topic 13: Anonymity in WSN
Topic 14: Botnet Detection
Topic 15: Trusted HW
Topic 16: Security of RFID ePassports
Topic 17: Node Replication Attack in WSN
Topic 18: Secure Data Aggregation in WSN
Topic 19: Privacy issues in Social Networks
Topic 20: Google Android smartphone security
Topic 21: Electronic Voting
Topic 22: P2P BotNet Detection
Topic 23: Taint Mechanisms
Topic 24: Browser Security
Topic 25: Privacy of Location Based Services
Topic 26: Named Data Networking Security
Topic 27: Named Data Networking Privacy
Topic 28: Cloud Security
Topic 29: Smartphone User Profiling



Topic 1: RFID Security
Primary:
Secondary:

Topic 2: Captcha
Primary:
Secondary:

Topic 3: Untrusted Storage
Primary:
  • P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish "Depot: Cloud Storage with Minimal Trust" , In the proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010).
Secondary:

Topic 4: SmartPhone Security
Primary:
Secondary:

Topic 5: Password Protection
Primary:
Secondary:

Topic 6: Distributed Denial of Service Attacks
Primary:
Secondary:

Topic 7: Sybil Attacks
Primary:
Secondary:
Additional Reading:
  • J. R. Douceur, "The Sybil Attack", First International Workshop on Peer-to-Peer Systems 2002.

Topic 8: Behavioural Biometrics
Primary:
Secondary:

Topic 9: VoIP Security
Primary:
Secondary:

Topic 10: Secure Content Delivery
Primary:
Secondary:

Topic 11: Anonymous Communications
Primary:
Secondary:

Topic 12: Keyloggers Detection
Primary:
Secondary:

Topic 13: Anonymity in WSN
Primary:
Secondary:

Topic 14: Botnet Detection
Primary:
Secondary:

Topic 15: Trusted HW
Primary:
Secondary:

Topic 16: Security of RFID ePassports
Primary:
Secondary:

Topic 17: Node Replication Attack in WSN
Primary:
Secondary:

Topic 18: Secure Data Aggregation in WSN
Primary:
Secondary:

Topic 19: Privacy issues in Social Networks
Primary:
Secondary:

Topic 20: Google Android smartphone security
Primary:
Secondary:

Topic 21: Electronic Voting
Primary:
Secondary:

Topic 22: P2P BotNet Detection
Primary:
Secondary:

Topic 23: Taint Mechanisms
Primary:
Secondary:

Topic 24: Browser Security
Primary:
Secondary:

Topic 25: Privacy of Location Based Services
Primary:
Secondary:

Topic 26: Named Data Networking Security
Primary:
Secondary:

Topic 27: Named Data Networking Privacy
Primary:
Secondary:

Topic 28: Cloud Security
Primary:
Secondary:

Topic 29: Smartphone User Profiling
Primary:
Secondary:




Last update: 2013-04-26
website hit counter