Each group has been assigned a fifteen-minute time slot. We expect you to use 10 minutes for your presentation. This leaves a couple minutes for questions, and a few extra minutes for the next group to setup. If you are the first group to present, make sure you arrive on time.
11:10 | Designing Graphical Password Schemes, Tiffany Dohzen, Ricarose Roque, and Tamara Stern. |
11:25 | A survey of the meaning of trust across websites and a trust recommendation system to promote safe surfing. Solomon Bisker, Vikki Chou, and Sarah Wu. |
11:40 | Web site verification, Matt Doherty, John Nham, Calvin On, and Kevin Su. |
11:55 | Designing a ``Really Nasty'' Rogue Wireless Access Point, David Dryjanski, Michael Naber, and Andrew Shafer. |
12:10 | A Study of MIT Information Systems, Jeff Cohen, Anders Kaseorg, Elizabeth Lovegrove, and Y. Zhou. |
11:10 | Time-Lapse Cryptography, Chris Thorpe and Dan Williams. |
11:25 | Client-Side Issues Related to Developing World Anonymity, Jacob Stultz, Josh Wilson, and Chris Walker. |
11:40 | Usability and Security of ThreeBallot, Greb Belote, Harvey Jones, and Jason Juang. |
11:55 | A Security Analysis of Web Browsing With Tor, Tim Abbott, Katherine Lai, Michael Lieberman, and Eric Price. |
12:10 | Security of Mobile Ad-hoc Networks, Jongmin Baek, Jichao Qian, and Shinya Umeno. |
11:10 | (Title?), Anton Katz, Michael Murray, Jon Grimm, and Matt Brown. |
11:25 | MUSSO: A Multi-User Single Sign-On System, MinJi Kim, Sanjukta, Jonathan Rhodes, and Kah Seng Tay. |
11:40 | Practical Physical Authentication for the Web, Mankinde Adeagbo and David Blau. |
11:55 | MP3 Steganography, Brian Jacokes, Yuliya Kodysh, and Andrew Lisy. |
12:10 | SPP: A Security Protocol for Peer-to-Peer systems, Yosi Scharf, Kah Keng Tay, and Quang Hieu Vu. |