Computer Networds

Term Projects for Spring 2007

Students of Computer Networks are to do a project on any one of the topics listed below. Each project group can have one or two students. No two project group shall do the same project. The students shall submit their choice of topic to Dr S K Sinha, or Mr U Sharma, course instructors for the course, by 28 Feb, 2007. The groups will submit a project plan to the course instructors by 15 March, 2007. Final demostrations/presentation of the projects shall be in 2nd week of May.

List of project topics

  1. Digital Library
  2. Simple reference mark-up language and browser Simple NFS
  3. Online auction
  4. A subnet simulator
  5. File search engine / crawler
  6. Analyzing Network Traffic from a LAN.
  7. Cookie authentication
  8. Digital Signatures for Physical Mail
  9. Secure Instant Messengers
  10. CGI Security Issues
  11. Network Access Controls
  12. Security Policy Models
  13. Secure Sockets Layer 3.0: Overiew and Analysis
  14. Electronic Payment Schemes
  15. Electronic Voting
  16. Anti-spam techniques

Additional topics

  1. SmartBoard -- Encrypted BBS with Secure Server
  2. Secure Message Passing for High-Performance Distributed Computing
  3. Security and Usability of Card-Based Ciphers
  4. Security Policy and Mechanisms for Electronic Personal Health Records
  5. NetWatch: Taking Back the Internet
  6. Flingetty: Secure Multiparty Computation for a Dating Match-up System
  7. Quantum Cryptography: A Viability and Security Analysis
  8. Secure Peer-to-Peer Backup Systems
  9. Anonymous Routing in a Peer-to-Peer Network
  10. Analysis of Password Recovery Schemes
  11. Secure Corporate IM
  12. Continual Authentication with Keystroke Dynamics
  13. Two Perspectives on PGP Usability
  14. An Investigation of Current Methodologies in Buffer Overflow Attack and Prevention
  15. The Security of Time
  16. User Tracking on Trusting Networks
  17. A Secure Media Distribution Framework
  18. Security of Wireless Networks and Mobile Devices
  19. User Authentication in Cryptographic File Systems
  20. Steganography in Spam
  21. Proactive Cryptography Applications in Smart Cards
  22. Execution-Based Software Protection
  23. Steganography in TCP timestamps
  24. Rethinking Software Piracy: Active Software Rights Verification for Effective Control of Piracy
  25. Reputation-Based Certificate Authorities
  26. Analyzing the Security of 802.11 Wireless Networks
  27. Threshold Signatures and Open Source
  28. Security Aspects of Unicode
  29. Identity Theft
  30. Digital Multimedia Copyright Protection
  31. Design of a secure Pilot-based Authentication System
  32. Intrusion Detection Systems
  33. A Computer Testing System
  34. Digital Money-- Fault Tolerant Multibank System
  35. Cryp: An All-or-Nothing Encryption Scheme for Secure Multi-user Information Distribution
  36. Netscape's "What's Related" Service and Privacy/Security Issues
  37. PGP vs S/MIME
  38. Computing with Encrypted Data
  39. Network Security for Chat Programs
  40. Peer-to-Peer Security