Ross Anderson, Why Cryptosystems Fail
Find the 2006 CSI/FBI Computer Crime and Security Survey on the Internet and read it.
(5 points) (Project Track Only) Choose TWO
project topics you are potentially interested in.
For each of these topics prepare a list of 10 most relevant references arranged in the logical top-down order starting from the most broad general picture, and ending with the detailed view of the problem to be solved.
If possible each list should include at least one instance of each of the following types of references: book chapter, journal article, conference article, white paper, web site, ECE 646 project report from previous years, etc.
Please use a format of references recommended by the IEEE LaTeX Guide for the Preparation of Papers for IEEE Transactions and Journals. Here are links to the Microsoft Word Template and Guide and to the LaTeX template for Unix or Windows.
Please, submit printouts of your two lists. If you already work in a group your lists have to be proportional in length to the number of group members.
(5 points) (All Tracks) Review the contents
of the entire course web page, and choose or propose AT LEAST ONE
area of the web site you would like to contribute to.
The examples of pages you can design from scratch or significantly redesign include:
Update the list of companies working in the area of network and computer security, with a special focus on cryptography. Determine which of these companies have their main offices or local branches in the near vicinity of GMU (Northern Virginia, Maryland, D.C.). Try to find out which of the companies limit their employment to U.S. citizens and permanent residents only.
Hint: If you choose to work on this page, please contact the instructor about the CD with the Computer Security Products Buyers Guide.
Update this page with up-to-date links to web pages of cryptography courses taught at other universities in U.S. and abroad. Arrange your list by country and a state.
Try to find on the web the best lists of crypto and security conferences (e.g., IACR list, UCL list, etc.). Make sure that these lists are frequently updated. Create a web page that directs you to the best lists.
Enhance the comprehensive list of open-source cryptographic libraries.
Add your mother tongue or any other language you know very well to the English-French-Polish Cryptographic Dictionary already available on the web.
Update the existing list of cryptographic and security standards, grouped by a type of a standard and/or standardization body.
Update the thesis.html webpage with the links to MS and PhD theses in the area of cryptography and network security that are available on the web.
Update the site with Web Resources. You can suggest new categories and delete any old ones.
Please feel free to suggest and design any other cryptography-related web page that would be of interest to you and other students.
For Sep. 12 please submit a paper with your name, e-mail and which pages you want to update or newly create. From this I will compile a list of groups who then work on the updated or new pages together. The contribution must be proportional to the size of the group.
Submission of the updated pages is due Sept 26. Submit them via e-mail to firstname.lastname@example.org using ECE646-HW1 as the subject and please name your file pagename_your_GMU_username.html (e.g. resources_psmith.html). Please submit your designs in the plain HTML format, with a white background. We will include them in the resource section at a later time.