| Zhong Xia Ma | Insider Threats Assessment in the Real-World System | |||
| Gavin Grant Neale | Investigating the Feasibility of Keyboard Acoustic Attacks | |||
| Eugene Phan Hin Min | Biometrics: Application in Cryptographic Signatures | |||
| Chi Yuen | A Framework for Legal Analysis of DRM Systems: Copyright and Privacy | |||
| Hong Zhou | Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0 | |||
| Note: If you were a student in COMPSCI 725 S2 06, and you would like your termpaper to be published here, please send email to cthombor@cs. | ||||