Seminar on Internet Technologies (Summer 2010): Difference between revisions

Created page with '== Details == {{CourseDetails |credits=120h, 4 ECTS |module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II |ta=[http://www.net.informatik.uni-goett…'
 
 
(28 intermediate revisions by 4 users not shown)
Line 8: Line 8:
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=59364&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=59364&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|The seminar is ongoing but '''you can still take part'''. If you are interested in a topic please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information.}}


==Course description==
==Course description==
Line 24: Line 27:


==Schedule==
==Schedule==
* TBA
* <strike>Thursday, '''8 April 2010, 16.15 - 17.15''': First general meeting. Introduction to the course and open questions.</strike>
* Tuesday, '''1 June 2010, 14.00 - 16.15''': Presentations.
** 14.00 - 14.45: Twitter: a popular microblogging tool
** 14.45 - 15.30: User behavior in Online Social Networks
** 15.30 - 16.15: Security threats of Online Social Networks
* Thursday, '''30 September 2010''': Deadline for turning in the reports.


== Topics ==
== Topics ==
TBA


The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you.
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Topic'''
|{{Hl2}} |'''Topic advisor'''
|{{Hl2}} |'''Initial readings'''
|-
| Securing Media Transport Protocols
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]
|-
| Congestion Exposure, A study of its pros and cons
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://bobbriscoe.net/projects/refb/]
|-
| Net neutrality: A study of fairness on the internet
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]
|-
| LinkedIN: A study of the popular business oriented social networking site.
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://www.linkedin.com/]
|-
| Traffic Localization in P2P Networks
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
|-
| Modern Authentication Systems on the example of MS Geneva
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
|-
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://avispa-project.org/]
|-
| Distributed Hash Tables - Usage, properties and future development
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Distributed_hash_table]
|-
| Matrix Factorization Model based Network Coordinate System
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf]
|-
| <strike>Twitter: a popular microblogging tool</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://portal.acm.org/citation.cfm?id=1348556] [http://an.kaist.ac.kr/~sbmoon/paper/intl-conf/2010-www-twitter.pdf] [http://www.iptps.org/papers-2009/sandler.pdf]
|-
| <strike>User behavior in Online Social Networks</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf]
|-
| <strike>Security threats of Online Social Networks</strike>
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf]
|-
| Security and Privacy in Delay Tolerant Networks
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf][https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf][http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]
|-
| Security Design in Network Coordinate Systems
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
|}


==Workflow==
==Workflow==
Line 91: Line 163:
* '''Deadline: End of the semester.'''
* '''Deadline: End of the semester.'''


The report is the main part of your work. It must be between 12 and page of content (not including table of content, bibliography and such) and comprehensively cover your topic.
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.


=== 6. Block meetings ===
=== 6. Block meetings ===