TDDD17 Information Security, Second Course (6 ECTS)
Final presentations program
The presentations have been scheduled in 2 parallel sessions. Note that participation during the whole seminar is mandatory for both students in each group.
|13.15-14.00||(Un)Predictable people (antbo642 and nikha864)||Hotspot traffic analysis (pettu298 and eriro331)|
|Password security in practice (elipe344 and hakgu806)||Analyzing Internet-connected... (emmso236 and boymi096)|
|14.15-15.00||Empirical evaluation of... (henad221)||(Un)Predictable people (thefl596 and mathe296)|
|Hotspot traffic analysis (johst822 and emigu059)||Password security in practice (edwns842 and klaha707)|
|15.15-16.00||Certification transparency crawler (oskjo581 and joali220)||Empirical evaluation of... (magqv743 and henot901)|
|Analyzing Internet-connected... (adaha287 and mohkh623)||Tamper protection review (felfr379 and marsj725)|
Each group has 15 minutes for the presentation and 5 minutes for questions and discussion. All students in each group must be active and be prepared to answer questions.
The presentation should address a broad audience and should be in English.
There will be a computer beamer projector for power point presentations. Students who plan for a power point presentation must bring their own laptops. Also, before the session starts, they must check that their laptops are compatible with the beamer projector in the room.
Page responsible: Nahid Shahmehri
Last updated: 2017-05-19