Computer Science 3CN3
Computer Networks and Security
Software Engineering 4C03
Computer Networks and Computer Security
Winter 2009
Student Wiki Pages
CS 3CN3 Students
- Adams, Stephen (Steve)
Cell BE - A Network on a Chip
- Colby, Luke
Digital Enhanced Cordless Telecommunications (DECT)
- Collier, Matthew (Matt)
Internet Control Message Protocol
- Fay, Daniel (Dan)
Denial Of Service Attacks
- Hamilton, Robert (Bob)
Wi-Fi
- Katmeh, Mahmoud
Cryptography in Information Security
- Luong, Quang (Tom)
Tools for Conducting Denial of Service Attacks
- Mao, Yu
Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)
- Morsaline, Lorraine
Bluetooth
- Rosolak, Misha
The practicality of IPv6
- Saini, Sukneet
Dynamic Host Configuration Protocol (DHCP)
- Shen, Shengwei (Shen)
Social network service
- Shukri, Muhammed
Keystroke Logging
- Simpson, Aaron
Network Latency
- Stallaert, Jeffrey
Onion Routing
SE 4C03 Students
- Al-Haddad, Samer
Radio Frequency Identification (RFID)
- Al-Tahan, Ali
3G Communication
- Asokan, Praveena
Security in Smartphones
- Au, Matthew
Credit Card Chip Security and Technology
- Boudreau, Adam
Address Resolution Protocol (ARP)
- Chokshi, Kruti
How to Connect to the Internet via an ISP
- D'Angelo, Stephen
CAPTCHA
- El Meniawy, Monica
Security for Small Home Networks
- Eles, Colin
Rootkits
- Everson, Michael (Mike)
Proxy Server
- Fu, Lixi
Network firewall
- Gan, Victor
Steganography and Digital Watermarking
- Girard, Paul
Malware
- Gosyne, Darren
Peer to Peer File Sharing
- Han, Junsub
High-Speed Downlink Packet Access (HSDPA)
- Heifetz, Jeffrey
Man in the Middle Attack
- Holtom, Matthew (Matt)
Network Attached Storage
- Holtzman, Tyler
RSA Encryption Algorithm
- Ivanovic, Aleksandar (Alex)
Corporate Security and IT Policies
- Jaskolka, Jason
Ethical Hacking
- Jedrocha, Bart
Extensible Messaging and Presence Protocol
- Kim, Michael
Cloud Computing
- Kirby, David
Ethernet Routing Devices
- Komolafe, Temitope
Personal Data Protection and Privacy
- LaRocque, Thomas (Tom)
Public Key Authentication
- Leung, Gifford
AJAX Security
- Libera, Gregory (Greg)
Network Topology
- Luong, Philip
IP Spoofing
- Mankarious, Nathanael
Gobal Systems for Mobile Communications (GSM)
- Mordeca, Mark
WLAN Standard 802.11n
- Ng, Jacky
Domain Name System
- Nguyen, Anh-Quan
Web 2.0
- Petta, Nathaniel
Local area network
- Pires, Richard
??
- Rosario, Desnes (Des)
Bots & Botnets
- Russell, David
Trivial File Transfer Protocol
- Sadler, Jason
Load Balancing for Network Servers
- Shahrouri, Mohammad
Simple Mail Transfer Protocol (SMTP)
- Shams, Hina
Email Security
- Shelly, Akhil
Data Encryption for Storage Devices
- Takeda, Jeffrey (Masaki)
Statistics of Internet Threats
- Varghese, Nisha
VoIP
- Watson, Sean
Deep packet inspection
- Wong, Cheuk Kwan (Venus)
Fingerprint Authentication
- Wood, James
Multicasting
- Yu, Wilson
MD5 Rainbow Tables
- Zieba, Christopher (Chris)
Interplanetary Internet