This is an individual assignment. You are required to solve it on your own using whatever material you like. Please ssubmit the following honor code statement with your solution:
I have not taken any
help on this assignment from anyone and not provided any help to anyone. The solution has been entirely worked out by
me and represents my individual effort.
Please submit hard copy with the honor code statement. Your solution should be presented as a technical paper and should read smoothly and with continuity. Any additional references used should be accurately cited. Keep a copy for your records and reference. Any clarification questions regarding the assignment should be emailed to sandhu@gmu.edu. Clarifications will be posted on this page as needed. If you will not be in class on 6/15/04 please submit by email to sandhu@gmu.edu or by fax to 253-563-3509. (For email submission a simple statement of the honor code is sufficient, physical signature is not required.)
Answer both questions. For both questions provide a word count. Figures and Tables are exempted from the word count. Both questions have equal weight.
1. Write a 500 word critical review of the following paper.
§
Keyjacking:
Risks of the Current Client-side Infrastructure
Paper (PDF),
Presentation (PDF)
John Marchesini, S. W. Smith, Meiyuan Zhao, Dartmouth College
2nd PKI Research Workshop, 2003.
1. Read the following column in the Feb 2004 issue of IEEE Computer.
§
Simplifying
public key management
Gutmann, P.
Computer, Vol.37, Iss.2,
Feb. 2004
Pages: 101- 103
Write a 500 word article in response to this column. Tell me what you think about this column, including omissions, errors and areas where you disagree or agree with the author. Provide a list of additional sources used in your response. (This list does not count towards the 500 word limit.)