|
students's master's projects
on systems security and Information Assurance
Black, Jeffrey L. |
802.11 Wireless Adapter Driver Vulnerability Using The Linux/Unix Lorcon Library |
|
12/20/2007 |
Nandikonda, Sumankumar |
Design and Implementation of Cryptographic Auction |
|
1/10/2007 |
Bojanapally, Raghuveer R. |
User Account Provisioning Using Sun Identity Manager |
|
4/30/2007 |
Rector, Donald |
Understanding the Technical Aspects of Digital Information Recovery |
|
1/18/2006 |
Arshanapalli, Hemanth |
bSecure: Applications Security Model |
|
5/11/2006 |
Yalamanchali, Sree Roopa |
Design and Implementation of SSL Messenger |
|
5/2/2006 |
Llosa, Tulio |
A Secure, Scalable and Reliable Open Source Enterprise Email Server Solution |
|
4/19/2005 |
Wanichwatphibun, Akarapol |
Wireless LAN Security (IEEE 802.11a/b/g) |
|
9/23/2005 |
Pingeli, Krishna K. |
Reverse Engineering Process for Oracle 9i Mortgage Database (REDEMO01) |
|
12/23/2005 |
Patel, Jay |
Intrusion Response System using SOAP::Lite |
|
12/9/2004 |
Roh, Yoonho |
Network Design and Security Implementation to the Lan of a Hypothetical School District |
|
10/31/2003 |
Wang, Hui |
Proposal for a Secure and Reliable Web-Based Chat Room in On-Line Conference System of Biocore |
|
2/25/2002 |
Valentine, Mark |
C.A.R.E.T : Computer Aided Reverse Engineering Tool |
|
5/21/2001 |
Tan, Chilung |
Implementing Secured Socket Level Data Communication between a Client and Server Using the Language Java |
|
1/28/2000 |
Bedathur, Srikanth B. |
Emergency Dispatch Management System for Illinois Emergency Management Agency |
|
5/20/1999 |
|