IA012:2014 1S: Temas para o Trabalho Final

De DCA-Wiki

Temas para o Trabalho Final

São apresentados aqui alguns temas como sugestão para os trabalhos finais. Os alunos podem escolher entre os temas abaixo e sugerir outros temas, desde que enviem pelo menos duas referências de autores distintos sobre o assunto sugerido.

Novos temas serão acrescentados a esta lista brevemente. Visite-a novamente.


  • TF-01:Odnilson: Aspectos práticos e teóricos da Criptografia Quântica
    • slides
    • artigo
    • Referências:
      • Vignesh, R.S.; Sudharssun, S.; Kumar, K.J.J., "Limitations of Quantum & the Versatility of Classical Cryptography: A Comparative Study," Environmental and Computer Science, 2009. ICECS '09. Second International Conference on , vol., no., pp.333,337, 28-30 Dec. 2009.
      • Goel, Rajni; Garuba, M.; Girma, A., "Research Directions in Quantum Cryptography," Information Technology, 2007. ITNG '07. Fourth International Conference on , vol., no., pp.779,784, 2-4 April 2007,
      • Teja, V.; Banerjee, P.; Sharma, N. N.; Mittal, R. K., "Quantum cryptography: State-of-art, challenges and future perspectives," Nanotechnology, 2007. IEEE-NANO 2007. 7th IEEE Conference on , vol., no., pp.1296,1301, 2-5 Aug. 2007.
      • Martin LaMonica, "Quantum Cryptography with Ordinary Equipment", IEEE Spectrum Tech Talk, 28/05/2014


  • TF-02:Douglas Barbosa: Estado da arte em computação quântica
    • slides
    • artigo
    • Referências:
      • Rachel Courtland, "D-Wave Aims to Bring Quantum Computing to the Cloud: Vern Brownell, D-Wave’s CEO, talks about the company’s ongoing efforts to prove the potential of its hardware and its plans for the future", IEEE Spectrum Magazine Podcast; 9 Apr 2014
      • Jeremy Hsu, "D-Wave’s Year of Computing Dangerously: After a year of outside investigation, questions remain about a controversial quantum computer", IEEE Spectrum Magazine Podcast; 26 Nov 2013



  • TF-04:disponível: Desempenho de mecanismos de criptografia baseados em curvas elípticas
    • Referências:
      • EFFECTIVENESS_OF_ELLIPTIC_CURVE_CRYPTOGRAPHY.pdf
  • TF-05:disponível: Segurança em Physical Unclonable Functions (PUFs)
    • Referências:
      • Maes, R., Physically Unclonable Functions: Constructions, Properties and Applications, Katholieke Universiteit Leuven, Bélgica, 2012
      • Grabher, P., Page, D., Wojcik, M., On the (re)design of an FPGA-based PUF, University of Bristol, Reino Unido, 2013
      • Nabeel, M., Kerr, S., Ding, X., Bertino, E., Authentication and Key Management for Advanced Metering Infrastructures Utilizing Physically Unclonable Functions, Purdue University, EUA, 2012


  • TF-06:Rafael Oliveira: Segurança e Política de senhas
    • slides
    • artigo
    • Referências:
      • Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. Kelley, P.G.; Komanduri, S.; Mazurek, M.L.; Shay, R.; Vidas, T.; Bauer, L.; Christin, N.; Cranor, L.F. ; Lopez, J. 2012 IEEE Symposium on Security and Privacy (SP). Pages 523-537.
      • The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. Bonneau, J. 2012 IEEE Symposium on Security and Privacy (SP). Pages 538-552.


  • TF-07:Márcio: Criptografia baseada em hardware resistente a vazamentos
    • slides
    • artigo
    • Referências:
      • Practical Leakage-Resilient Symmetric Cryptography. Sebastian Faust, Krzysztof Pietrzak and Joachim Schipper. In Proceedings of the 14th International Conference on Cryptographic Hardware and Embedded Systems – CHES 2012. Pages 213-232.
      • Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. Marcel Medwed, François-Xavier Standaert and Antoine Joux. In Proceedings of the 14th International Conference on Cryptographic Hardware and Embedded Systems – CHES 2012. Pages 193-212.


  • TF-08:disponível: Protocolo de acordo de chave com autenticação sem certificado
    • slides
    • artigo
    • Referências:
      • Lippold et. al. “Strongly secure certificateless key agreement. Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography. 2009
      • Swanson e Jao. “A study of two-party certificateless authenticated key-agreement protocols. Proceedings of the 10th International Conference on Cryptology in India. 2009.
      • Goya, D. H. “Criptografia de Chave Pública sem Certificado”. Tese de Doutorado IME-USP. 2011. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-02082012-191831/pt-br.php#referencias




  • TF-11:Alex: Segurança em redes privadas virtuais (VPN)
    • slides
    • artigo
    • Referências:
      • Virtual_private_networks_powered_by_Elliptic_Curve.pdf
      • Virtual_Private_Network_Security.pdf
      • Performance_Comparison_of_IPSEC_and_TLS_Based_VPN_Technologies.pdf
      • Algorithm_of_Combined_Method_for_Symbol_Encoding_In_Virtual_Private_Networks.pdf
      • Enhancing_VPN_Security_Through_Security_Policy_Management.pdf


  • TF-12:Eder: Segurança na implementação do protocolo TLS
    • slides
    • artigo
    • Referências:
      • Tim Polk, Kerry McKay, Santosh Chokhani, "Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations", NIST Special Publication 800-52 Revision 1, abr/2014


  • TF-13:disponível: Perfect Forward Secrecy
    • Referências:
      • Diffie, Whitfield; van Oorschot, Paul C.; Wiener, Michael J. "Authentication and Authenticated Key Exchanges". Designs, Codes and Cryptography. pages=107–125 (2): 107. doi:10.1007/BF00124891. Jun/1992
      • Jablon, David P. (October 1996). "Strong Password-Only Authenticated Key Exchange". ACM Computer Communication Review 26 (5): 5–26. doi:10.1145/242896.242897
      • Vincent Bernat. "SSL/TLS & Perfect Forward Secrecy"


  • TF-14:Vitor: Gestão de identidades e segurança
    • slides
    • artigo
    • Referências:
      • Maler, E. and Reed, D., "The Venn of Identity: Options and Issues in Federated Identity Management", Security & Privacy, IEEE (Volume:6 , Issue: 2 ), 2008
      • Dhamija, R. and Dusseault, L., "The Seven Flaws of Identity Management: Usability and Security Challenges", Security & Privacy, IEEE (Volume:6 , Issue: 2 ), 2008


  • TF-15:Grim: Privacidade em era de conexão total
    • slides
    • artigo
    • Referências:
      • Hansen, M. ; Schwartz, A. ; Cooper, A., "Privacy and Identity Management", Security & Privacy, IEEE (Volume:6 , Issue: 2 ), 2008
      • Acquisti, A. , "Identity Management, Privacy, and Price Discrimination", Security & Privacy, IEEE (Volume:6 , Issue: 2 ), 2008
      • Li, Ming; Wenjing Lou ; Kui Ren, "Data security and privacy in wireless body area networks", Wireless Communications, IEEE (Volume:17 , Issue: 1 ), 2010


  • TF-16:Ricardo: Segurança em computação nas nuvens
    • slides
    • artigo
    • Referências:
      • Kaufman, L.M., "Data Security in the World of Cloud Computing", Security & Privacy, IEEE, Volume:7 Issue:4, 2009
      • Yanpei Chen, Vern Paxson, Randy H. Katz, "What’s New About Cloud Computing Security?", University of California at Berkeley Technical Report No. UCB/EECS-2010-5, http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html, January 20, 2010
      • Dimitrios Zissis, Dimitrios Lekkas, "Addressing cloud computing security issues", Future Generation Computer Systems, Volume 28, Issue 3, March 2012


Temas propostos por alunos



  • TF-53: Fillipe: Lattice Based Forward-Secure Identity
    • slides
    • artigo
    • Referências:
      • Daniele Micciancio, Oded Regev, "Lattice-based Cryptography", 2008
      • Kunwar Singh, C. Pandurangan, A.K.Banerjee, "Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext", Journal of Internet Services and Information Security (JISIS), volume: 3, number: 1/2, pp. 5-19





  • TF-57: Jasiel: Segurança digital utilizando esteganografia
    • slides
    • artigo
    • Referências:
      • PROVOS, N.; HONEYMAN, P. Hide and Seek: An Introduction to Steganography, IEEE Security & Privacy, 1(3): 32-44, maio/junho 2003.
      • PETITCOLAS, F. A. P.; ANDERSON, R. J.; KUHN, M. G. Information Hiding – A Survey. Proceedings of the IEEE special issue on protection of multimedia content, 87(7): 1062-1078, julho 1999.
      • JULIO, E. P; BRAZIL, W. G.; ALBUQUERQUE, C. V. N. Esteganografia e suas Aplicações. Universidade Federal Fluminense.



Ferramentas pessoais