1.
Schedule
Submission |
Due |
Proposal
|
2001.
3. 8 |
Mid
report |
|
Final
report |
|
Final
paper |
|
2.
Students
¹®°æ´ö
: Cryptosystem for telemetric application based on public key mechanism
(Proposal, Mid report, Final report,
Final paper)
Àü¼ºÀÍ
: Toward A new Authorization Paradigm for Secure Personalized Web Browsing
Using Smart Card Technology
(Proposal,
Mid report, Final report, Final paper)
°¼¼ÈÆ
: Implementation of cryptographic code distribution module in ANTS
(Proposal, Mid report, Final
report, Final paper)
°¹®¼ö
: Implementation of Fiat-Shamir Protocol in JAVA
(Proposal, Mid report, Final
report, Final paper)
±è¸í¼±
: Implementation of Fiat-Shamir protocol
(Proposal, Mid report, Final
report, Final paper)
ÀÌ°æÈñ
: Security in the concatenation and optimization for resource reservation path
(CORP) mechanism
(Proposal,
Mid report, Final report, Final paper)
±èµ¿Áø
:
(Proposal, Mid report, Final
report, Final paper)
±è¹®ÁÖ
:
(Proposal, Mid report, Final
report, Final paper)
±èÁ¾½Â
: Implementation of internet bidding system
(Proposal,
Mid report, Final report, Final paper)
ÀÌÁ¤¿¬
: Ÿ¿ø°î¼±ÀÇ À§¼ö°è»ê
(Proposal, Mid report, Final
report, Final paper)
ÀÌÇö·Ï
: Design and implementation of secure P2P system
(Proposal, Mid report, Final
report, Final paper)
ÇÔ¿ì¼®
: Implementation of RSA in Java card
(Proposal, Mid report, Final
report, Final paper)
ÀӹαÔ
: Cryptographic messaging in the networked virtual environments
(Proposal,
Mid report, Final report, Final paper)