| Presentation Order for CompSci 725 FC 2001 | ||||
| Order | Surname | First Names | Paper | |
| 1 | 0.967804 | Wei | Zhong | Chess, "Security Issues in Mobile Code Systems" (first 8 pp.) |
| 2 | 0.957479 | Li | Jinping | Bellare et al., "Design … Electronic Payment System" |
| 3 | 0.956737 | Alford | Mark Leslie | Cox & Linnartz, "Some General Methods for Tampering with Watermarks" |
| 4 | 0.927839 | Yang | Weimin | Aucsmith, "Tamper Resistant Software: An Implementation" |
| 5 | 0.889323 | Liu | Yi | Paxson, "Bro: A System for Detecting Network Intruders in Real-Time" |
| 6 | 0.882773 | (dropped) | ||
| 7 | 0.882537 | Painter | Matthew Charles | Lindquist & Jonsson, "A Map of Security Risks Associated with using COTS" |
| 8 | 0.82837 | Hassan | Halah | Margrave, "GSM Security and Encryption" |
| 9 | 0.808261 | Liu | Zisheng | Girard & Lanet, "New Security Issues Raised by Open Cards" |
| 10 | 0.8021 | Rugg | Gene Andrew | Sobe, "Spatial-Domain Image Watermarking…" |
| 11 | 0.783212 | Deng | Xiao Fei | Hohl, "Time Limited Blackbox Security" |
| 12 | 0.729635 | Zhang | Wei | Krsul & Spafford, "Authorship Analysis …" |
| 13 | 0.668534 | (dropped) | ||
| 14 | 0.632656 | Shen | Yu-Chang | Ousterhout, "The Safe-Tcl Security Model" |
| 15 | 0.629781 | Ihle | Benjamin Luke | Cohen, "Operating System Protection Through Program Evolution" |
| 16 | 0.609978 | Ren | Min | Garcia-Molina & Shivakumar, "Safeguarding and Charging for Information …" |
| 17 | 0.608117 | Li | Ming | Bates, "Fundamentals of Computer Forensics" |
| 18 | 0.529476 | Li | Yongqiang | Gong et al., "Signing, Sealing and Guarding Java Objects" |
| 19 | 0.522571 | Stanton | Craig Alan | Law, "How to Make a Mint ..." |
| 20 | 0.514562 | Zhang | Mingzeng | Dowd, "Network Security: It's Time to Take It Seriously" |
| 21 | 0.508062 | Liu | Jenny | Drew, Java Security (?) |
| 22 | 0.398999 | Cheeseman | Aaron Julian | (extract from Computer Forensics monograph) |
| 23 | 0.377737 | Tang | Jianning | Ferguson et al., "Improved Cryptanalysis of Rijndael" |
| 24 | 0.288463 | Kurlatov | Igor N | Gilmore, "Secure Remote Access to an Internal Webserver" |
| 25 | 0.254923 | Liu | Zhihui | Saltzer, "The Protection of Information in Computer Systems" (?) |
| 26 | 0.210136 | Li | Fajie | LaDue, "The Maginot License…" |
| 27 | 0.195937 | Lim | Tang Kok | Ho, "A Study into the Problem of Software Piracy" |
| 28 | 0.14606 | Naidu | Roneel Rohiteshwaran | Devanbu & Stubblebine, "Software Engineering for Security: A Roadmap" |
| 29 | 0.133247 | Derhamy | Seyed Hosein | Hunt, "Internet/Intranet Firewall Security …" |
| 30 | 0.105557 | Wu | Haipeng | Wallach et al., "Extensible Security Mechanisms for Java" |
| 31 | 0.017503 | West | Clare Jacqueline | Hedbom et al, "Analysis of the Security of Windows NT" (?) |