KING FAHD UNIVERSITY OF PETROLEUM & MINERALS
COLLEGE OF
COMPUTER SCIENCES & ENGINEERING
COMPUTER ENGINEERING DEPARTMENT
COE 449: Network Security Engineering
Term
081
Instructor
Dr. Adnan Gutub.
Selected
Paper & Presentation Schedule
v Below
is the table showing the chosen paper for you which should be understood in
depth and a one page summary report is to be submitted. v The
report should be in the students own words and not copied from the
resources. v This summary
report should be submitted by the end of Week 10 (20 December 2008)
as indicated through WebCT. v Prepare
your presentations for minimum 15 min and not to exceed 20 min. |
||
Paper |
Student |
Presentation |
Raising the Bar
for Hardware Security |
Eyad Al-Hazemi |
Week 12 7 Jan 2009 |
XML Document Encrypt Implementation using Elliptic
Curve Cryptosystem |
Hani Al-Sufyani |
|
Modular
Matrix Cipher and Its Application in Authentication Protocol |
Hazem
Al-Gerafi |
|
Security Objectives within a Security Testing Case
Study |
Muhammad
Felemban |
|
Intrusion prevention systems: superior security |
Atiyah
Al-Nakhli |
|
|
|
|
Reliability, Availability and Security of Wireless
Networks in the Community |
Noor
Mohiuddin |
Week 13 14 Jan
2009 |
Top Threats to |
Saleh
Al-Wayeli |
|
Specifying Security Goals of Component Based Systems
: An End-User Perspective |
Abdul-Aziz Al-Zugaibi |
|
Analysis of Distributed Intrusion Detection Systems
using Mobile Agents |
Mustafa Al-Ibrahim |
|
|
|
|
Cryptanalysis with COPACOBANA |
Jassim Al-Bazron |
Week 14 21 Jan 2009 |
Toward New Generation Quantum Cryptography -
Japanese strategy - |
Dhari Al-Dhari |
|
Choosing the
Right Wireless LAN Security Protocol for the Home and Business User |
Hamad Al-Hajri |
|
Sensor
Network Security: More Interesting Than You Think |
Ahmad
Dehwah |
|
|
|
|
Research
Directions in Quantum Cryptography |
Ahmad Al-Ghamdi |
Week 15 28 Jan 2009 |
Cloaker: Hardware Supported Rootkit Concealment |
Mansoor Al-Mutairi |
|
Knowledge
Structure on Virus for User Education |
Salman
Alshammari |
|
Return On
Security Investment (ROSI) – A Practical Quantitative Model |
Yousef
Baisa |
|
|
|
|