Computer Networds
Term Projects for Spring 2007
Students of Computer Networks are to do a project on any one of the topics
listed below. Each project group can have one or two students. No two project
group shall do the same project. The students shall submit their choice of
topic to Dr S K Sinha, or Mr U Sharma, course instructors for the course, by
28 Feb, 2007. The groups will submit a project plan to the course instructors
by 15 March, 2007. Final demostrations/presentation of the projects shall be
in 2nd week of May.
List of project topics
- Digital Library
- Simple reference mark-up language and browser
Simple NFS
- Online auction
- A subnet simulator
- File search engine / crawler
- Analyzing Network Traffic from a LAN.
- Cookie authentication
- Digital Signatures for Physical Mail
- Secure Instant Messengers
- CGI Security Issues
- Network Access Controls
- Security Policy Models
- Secure Sockets Layer 3.0: Overiew and Analysis
- Electronic Payment Schemes
- Electronic Voting
- Anti-spam techniques
Additional topics
- SmartBoard -- Encrypted BBS with Secure Server
- Secure Message Passing for High-Performance Distributed Computing
- Security and Usability of Card-Based Ciphers
- Security Policy and Mechanisms for Electronic Personal Health Records
- NetWatch: Taking Back the Internet
- Flingetty: Secure Multiparty Computation for a Dating Match-up System
- Quantum Cryptography: A Viability and Security Analysis
- Secure Peer-to-Peer Backup Systems
- Anonymous Routing in a Peer-to-Peer Network
- Analysis of Password Recovery Schemes
- Secure Corporate IM
- Continual Authentication with Keystroke Dynamics
- Two Perspectives on PGP Usability
- An Investigation of Current Methodologies in Buffer Overflow Attack and
Prevention
- The Security of Time
- User Tracking on Trusting Networks
- A Secure Media Distribution Framework
- Security of Wireless Networks and Mobile Devices
- User Authentication in Cryptographic File Systems
- Steganography in Spam
- Proactive Cryptography Applications in Smart Cards
- Execution-Based Software Protection
- Steganography in TCP timestamps
- Rethinking Software Piracy: Active Software Rights Verification for
Effective Control of Piracy
- Reputation-Based Certificate Authorities
- Analyzing the Security of 802.11 Wireless Networks
- Threshold Signatures and Open Source
- Security Aspects of Unicode
- Identity Theft
- Digital Multimedia Copyright Protection
- Design of a secure Pilot-based Authentication System
- Intrusion Detection Systems
- A Computer Testing System
- Digital Money-- Fault Tolerant Multibank System
- Cryp: An All-or-Nothing Encryption Scheme for Secure Multi-user
Information Distribution
- Netscape's "What's Related" Service and Privacy/Security Issues
- PGP vs S/MIME
- Computing with Encrypted Data
- Network Security for Chat Programs
- Peer-to-Peer Security