ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
|
|
- Jesse Singleton
- 6 years ago
- Views:
Transcription
1 646 Cryptography and Computer Network Security Course web page: Google Kris Gaj 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact: The Engineering Building, room 3225 Office hours: Tuesday, 6:00-7:00 PM Thursday, 3:15-4:15 PM and by appointment 1
2 646 Part of: MS in Computer Engineering Fundamental course for the specialization areas: Network and System Security Computer Networks Elective course in the remaining specialization areas MS in Electrical Engineering Fundamental course for the specialization area: Communications and Networking Elective course in the remaining specialization areas 646 Part of: MS in Information Security and Assurance Elective course for the concentrations: Network and System Security Applied Cyber Security PhD in Electrical and Computer Engineering PhD in Computer Science PhD in Information Technology 2
3 MS CpE: NETWORK AND SYSTEM SECURITY Advisors: Kris Gaj, Jens-Peter Kaps, Kai Zeng Computer Network Architectures and Protocols S. Yun, et al Cryptography and Computer Network Security K. Gaj, J.-P. Kaps lab, project Advanced Applied Cryptography J.-P. Kaps, K. Gaj lab, project 4. ISA 656 Network Security X. Wang, R. Simon Cryptographic Engineering J.-P. Kaps project MS CpE: COMPUTER NETWORKS Advisors: Brian Mark, Bijan Jabbari, Peter Paris, Zhi Tian Introduction to Random Processes in Y. Ephraim, Z. Tian, et al Computer Network Architectures and Protocols S. Yun, et al Design and Analysis of Comp. Comm. Networks B. Jabbari Cryptography and Computer Network Security K. Gaj, J.-P. Kaps lab, project Wireless Networks B. Jabbari High-Speed Networks B. Mark 3
4 MS EE: COMMUNICATIONS AND NETWORKING security & applications performance network link physical comm theory EE core Comp. Network Architectures and Protocols 542 CpE core Optoelectronics EE core Random Processes Operating Systems CpE CS 571 core Wireless Design & Analysis Networks of Comm. Networks 642 Wireless Comm. & Networks 630 Statistical Comm. Theory 633 Coding Theory High-Speed Networks Digital Mobile Comm. Comm. Network Security CS 672 CS 756 Performance Analysis & Evaluation 737 Spread Spectrum Comm. 739 Satellite Comm. A few words about You 2 Non-degree 1 PhD IT 1 PhD CS 3 PhD 4 MS EE 10 MS ISA 8 MS CpE 4
5 646 Lecture Homework 10 % Midterm exam 20 % Final Exam 25 % Laboratory 10 % Project 35 % Specification - 5 % Results - 10 % Oral presentation - 10% Written report - 8% Review - 2% Bonus Points for Class Activity Based on class exercises during lecture Small points earned each week posted on BlackBoard Up to 5 big bonus points Scaled based on the performance of the best student For example: Small points Big points 1. Alice Bob Charlie 8 1 5
6 deapth viewgraphs / whiteboard Lecture viewgraphs available on the web (please, extend with your notes) books 1 required (Stallings) 2 optional (all chapters available on the book web page) articles (PQCrypto, CHES, CRYPTO, EUROCRYPT, etc.) web sites - Crypto Resources standards, FAQs, MOOCs, conferences, open source software, research groups 6
7 Homework optional assignments short programs vs. analytical problems or HDL codes ü More time consuming ü Most time spent on debugging ü Relatively straightforward ü Typically less time consuming ü More thinking ü Little writing Getting Help Outside of Office Hours System for asking questions 24/7 Answers can be given by students and instructors Student answers endorsed (or corrected) by instructors Average response time in Fall 2015 = 41 minutes You can submit your questions anonymously You can ask private questions visible only to the instructors 7
8 Midterm exam ü 2 hours 40 minutes ümultiple choice test + short problems ü open-books, open-notes ü practice exams (with solutions) available on the web Tentative date: Tuesday, October 31 Final exam 2 hours 45 minutes Multiple choice + several problems Tuesday, December 19 7:30 10:15 PM 8
9 Laboratory labs based on two major software packages ü CrypTool ü GnuPG for Windows, Linux, or Mac done at home or in the labs: software downloaded from the web based on detailed instructions grading based on written reports (answers to questions included in the instructions) Project (1) original useful depth, originality based on additional literature you can start at the point where former students ended based on something you know and are interested in software, hardware, analytical, or mixed may involve experiments teams of 1-3 students 9
10 Mixed Projects AN AN 20% 20% 40% SW 80% 40% AN 60% SW 40% Project (2) about three weeks to choose a topic and write the corresponding specification regular meetings with the instructor a few oral progress reports based on Power Point slides draft final presentation due at the last progress report short conference-style oral presentations contest for the best presentation written report/article, IEEE style publication of reports and viewgraphs on the web 10
11 Project (3) Project reports/articles requirements - IEEE style - 15 pages maximum - appendices possible but do not influence the evaluation Review of project reports - initial version of the report due Sunday, Dec reviews done by your colleagues - reviews due, Thursday, Dec final version of the report due Saturday, Dec. 16 Project (4) Project presentations Tuesday, December 5, 4:30-9:30PM - conference style - open to general public (in particular, students from previous years) - 10 minutes for the presentation + 5 minutes for Q&A - time strictly enforced - audience votes in the contest for the best project 11
12 Contest for the best project Two independent categories: Results Presentation Scale: 0 = very poor to 10 = excellent Results Meeting Project goals Efficiency & security of the proposed/selected design/scheme Original & Correct analysis implementation & testing scheme Useful for other students & other members of the cryptographic community 12
13 Presentation Motivation & background Logical Clear organization and Concise of the talk presentation of main results Quality of viewgraphs Answering questions Discussion of encountered problems Conclusions Awards (separate in each category) I award - 5 points II award - 3 points III award - 1 point 13
14 Typical Approach to an Analytical Project Two or more alternative solutions to a certain problem. Clear evaluation criteria, and their relative importance. Evaluation of all investigated solutions according to these criteria. Sometimes, there is a clear winner. In other cases, the winner depends on a particular application scenario. Mutual dependencies among various evaluation criteria. Critical analysis of previous literature, looking for any mistakes, inconsistencies, missing assumptions, or other flaws of previous work. Any remaining imperfections/disadvantages of the best currently available solution, and suggestions for possible improvements. Types of Projects Typically Winning the Contest Fall 2013 Fall 2012 SW AN SW-AN -AN Fall 2011 AN Fall 2010 AN -SW
15 Winners of the Contest in Fall 2014 & Fall 2015 Fall Fall 2015 SW Combining Projects from Two Different Courses 646 & project: Hardware implementation of Post-Quantum Cryptographic Algorithms 545 project can be extended into an 646 project by adding additional ciphers, architectures, key sizes, modes of operation, etc. 646 & 797/798/799/ project can be extended into a Research Project, Master s Thesis, PhD Thesis 15
16 After completing 18 credit hours of graduate work, a student 1. Chooses a level course to fulfill his/her 797 requirement Scholarly Paper (1) 2. Registers for 797 via Patriotweb by first requesting an override from the Academic Programs Coordinator, Ms. Patricia Sahs (psahs@gmu.edu), before the last day to add classes 3. Chooses a project topic in consultation with the instructor 4. Submits a single 797 Entry Form, signed by the instructor and the student, to the Main Office by the end of the 5 th week of classes in a given semester 5. Works on a project individually 6. Submits written report and gives short oral presentation 7. Asks the instructor to fill and sign the 797 Evaluation Form, and submits this form to the main Office 31 Scholarly Paper (2) The paper and presentation must follow accepted standards for English technical merit literature analysis citation of references GMU Honor Code In order to pass, the student cannot receive an Unacceptable score for any evaluated outcome Students are encouraged to sign for 797 in their last but one semester which guarantees at least two attempts 16
17 International Students Olympiad in Cryptography NSUCRYPTO First Round: October 22, 2017 Duration: 4 hrs 30 min Section B: for University students and professionals Second Round: October 23-30, 2017 Team Round Solving hard research and programming problems of crypto Bonus points for the participation and solving the competition problems! NSUCRYPTO
18 Typical course difficulty time difficulty This course time Follow-up courses Cryptography and Computer Network Security 646 Advanced Applied Cryptography Digital System 746 Design with VHDL 545 Cryptographic Engineering 747 Software/Hardware Codesign 615 Computer Arithmetic
19 Cryptography and Computer Network Security Advanced Applied Cryptography Modular integer arithmetic Operations in the Galois Fields GF(2 n ) Historical ciphers Classical encryption (DES, AES, cipher modes) Public key encryption (RSA, Diffie-Hellman) Hash functions and MACs Digital signatures Public key certificates Secure Internet Protocols - PGP and S-MIME - www: SSL/TLS Cryptographic standards AES Stream ciphers Elliptic curve cryptosystems Random number generators Smart cards Attacks against implementations (timing, power, fault analysis) Efficient and secure implementations of cryptography Security in various kinds of networks (IPSec, wireless) Zero-knowledge identification schemes 19
ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationKris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646
646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:
More informationECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationECE 297:11 Reconfigurable Architectures for Computer Security
ECE 297:11 Reconfigurable Architectures for Computer Security Course web page: http://mason.gmu.edu/~kgaj/ece297 Instructors: Kris Gaj (GMU) Tarek El-Ghazawi (GWU) TA: Pawel Chodowiec (GMU) Kris Gaj George
More informationMS in Electrical Engineering & MS in Computer Engineering
MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program, Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College
More informationMS in Electrical Engineering & MS in Computer Engineering
MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College
More informationKris Gaj. Research and teaching interests: cryptography computer arithmetic FPGA design and verification
Kris Gaj Research and teaching interests: Contact: cryptography computer arithmetic FPGA design and verification Engineering Bldg., room 3225 kgaj@gmu.edu (703) 993-1575 Office hours: Monday, 3:00-4:00
More informationECE 448 FPGA and ASIC Design with VHDL. Spring 2018
ECE 448 FPGA and ASIC Design with VHDL Spring 2018 Kris Gaj Research and teaching interests: reconfigurable computing cryptography computer arithmetic network security Contact: The Engineering Building,
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationHardware Architectures
Hardware Architectures Secret-key Cryptography Public-key Cryptography Cryptanalysis AES & AES candidates estream candidates Hash Functions SHA-3 Montgomery Multipliers ECC cryptosystems Pairing-based
More informationCS 241 Data Organization using C
CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am
More informationCity University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286
More informationISM 324: Information Systems Security Spring 2014
ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationCourse Name: Information and Computers Networks Security Course Code: IT423
Course Name: Information and Computers Networks Security Course Code: IT423 I. Basic Course Information Major or minor element of program: Major Department offering the course:information Technology Department
More informationPhD Candidacy Exam Overview
EDIC - Doctoral Program in Computer & Communication Sciences PhD Candidacy Exam Overview https://phd.epfl.ch/edic/candidacyexams Candidacy exam background The philosophy After your 1 st year of PhD you
More informationPart A: Course Outline
University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School
More informationPOST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK DR. DANIEL SLAMANIG
POST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK 2018 02.02.2018 DR. DANIEL SLAMANIG WHAT IS POST-QUANTUM CRYPTOGRAPHY? Also called quantum safe/resistant cryptography NOT quantum cryptography (= quantum
More informationCryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1
Cryptography Dr. Michael Schneider michael.schneider@h-da.de October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationComputer Networks IT321
Computer Networks IT321 CS Program 3 rd Year (2 nd Semester) Page 1 Assiut University Faculty of Computers & Information Computer Science Department Quality Assurance Unit Computer Networks Course Specifications
More informationESET 349 Microcontroller Architecture, Fall 2018
ESET 349 Microcontroller Architecture, Fall 2018 Syllabus Contact Information: Professor: Dr. Byul Hur Office: 008 Fermier Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu
More informationECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology)
ECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology) Spring 2010 Paul I-Hai Lin, Professor of Electrical and Computer Engineering Technology Indiana University-Purdue
More informationLecture Notes Cryptography Michael Nüsken b-it. Winter 2015/2016
Lecture Notes Cryptography Michael Nüsken b-it (Bonn-Aachen International Center for Information Technology) Winter 2015/2016 c 2015, 2016 Michael Nüsken Organizational Organizational Course website: https://cosec.bit.uni-bonn.de/students/teaching/15ws/15ws-crypto/
More informationCS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background
CS 134: Elements of Cryptography and Computer + Network Security Winter 2016 sconce.ics.uci.edu/134-w16/ 1 CS 134 Background 11:00-12:20 @ SSL 290 Discussions section as needed (must register!) Senior-level
More informationCSC 111 Introduction to Computer Science (Section C)
CSC 111 Introduction to Computer Science (Section C) Course Description: (4h) Lecture and laboratory. Rigorous introduction to the process of algorithmic problem solving and programming in a modern programming
More informationCS 241 Data Organization. August 21, 2018
CS 241 Data Organization August 21, 2018 Contact Info Instructor: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Room 2120 of Farris Web site: www.cs.unm.edu/~vasek/cs241/
More informationIT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 341 Data Communications and Networking Principles Syllabus (Revised 08/14/2017) Section
More informationCoSci 440 SYLLABUS Programming in C++ INSTRUCTOR Mari Rettke cell SECTION : and 13345
CoSci 440 SYLLABUS Programming in C++ INSTRUCTOR Mari Rettke samusher@aol.com 818.470.8419 - cell SECTION : 13327 and 13345 Course Description Covers C++ language and object-oriented programming paradigm.
More informationCSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits
CSci 4211: Introduction to Computer Networks Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office: Keller
More informationCONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More informationCPSC 2380 Data Structures and Algorithms
CPSC 2380 Data Structures and Algorithms Spring 2014 Department of Computer Science University of Arkansas at Little Rock 2801 South University Avenue Little Rock, Arkansas 72204-1099 Class Hours: Tuesday
More informationINFS 2150 (Section A) Fall 2018
INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;
More informationUniversity of San Francisco Course Syllabus and Outline
College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationIntroduction to Post-Quantum Cryptography
Introduction to Post-Quantum Cryptography CERG @ GMU http://cryptography.gmu.edu 10 PhD students 3 MS students Features Required from Today s Ciphers STRENGTH PERFORMANCE software hardware FUNCTIONALITY
More informationIntroduction to Post-Quantum Cryptography
Introduction to Post-Quantum Cryptography CERG @ GMU http://cryptography.gmu.edu 10 PhD students 3 MS students 1 Features Required from Today s Ciphers STRENGTH PERFORMANCE software hardware FUNCTIONALITY
More informationSyllabus CS 430 Introduction to Computer Security Winter 2016
Syllabus CS 430 Introduction to Computer Security Winter 2016 Meeting Times Instructor TA Textbooks Lect: 3:00-3:50 M, Tu, Wed, Th, HB 106 Lab: 3:00-3:50 M, HB 203 Dr. Razvan Andonie, HB 214-E, Office
More informationCourse and Contact Information. Course Description. Course Objectives
San Jose State University College of Science Department of Computer Science CS157A, Introduction to Database Management Systems, Sections 1 and 2, Fall2017 Course and Contact Information Instructor: Dr.
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationIntroduction to Computer Systems
Introduction to Computer Systems Syllabus Web Page http://www.cs.northwestern.edu/~pdinda/icsclass Instructor Peter A. Dinda 1890 Maple Avenue, Room 338 847-467-7859 pdinda@cs.northwestern.edu Office hours:
More informationCPSC 4600 Biometrics and Cryptography Fall 2013, Section 0
CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li
More information8/30/17. Introduction to Post-Quantum Cryptography. Features Required from Today s Ciphers. Secret-key (Symmetric) Ciphers
CERG @ GMU http://cryptography.gmu.edu Introduction to Post-Quantum Cryptography 10 PhD students 3 MS students Features Required from Today s Ciphers Secret-key (Symmetric) Ciphers STRENGTH PERFORMANCE
More informationCPSC 5157G Computer Networks
CPSC 5157G Computer Networks Instructor Dr. Jianhua Yang Center for Commerce and Technology 28 (706) 565 3520 e mail: yang_jianhua@colstate.edu website: http://csc.colstate.edu/yang/ Office Hours (Fall
More informationTCOM 663/CFRS Intrusion Detection and Forensics Department of Electrical and Computer Engineering George Mason University Fall, 2010
TCOM 663/CFRS 663 - Intrusion Detection and Forensics Department of Electrical and Computer Engineering George Mason University Fall, 2010 Course Syllabus Revised: June. 16, 2010. Instructor Dr. Kafi Hassan
More informationCS 6903: Modern Cryptography Spring 2011
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2011 Nitesh Saxena NYU-Poly Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s11
More informationSyllabus Revised 08/21/17
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 445 Advanced Networking Principles II Syllabus Revised 08/21/17 Instructor: Pouyan
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationMurach's HTML and CSS3 3 rd Edition By Boehm, Anne Fresno, Calif Publisher: Mike Murach & Associates, 2015 ISBN-13:
Course Number: IS117 Course Title: Introduction to Website Development Section: 005 Semester: Fall 2017 Date & Time: Tuesday: 1:00 PM 4:PM Location: - PC MALL 40 Credits: 3 Contact Hours: 3 Hours Face-to-Face
More informationTextbook(s) and other required material: Raghu Ramakrishnan & Johannes Gehrke, Database Management Systems, Third edition, McGraw Hill, 2003.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW371 Database Systems II Syllabus 1 st Semester 2013/2014 Part
More informationCourse and Contact Information. Course Description. Course Objectives
San Jose State University College of Science Department of Computer Science CS157A, Introduction to Database Management Systems, Sections 1 and 2, Fall2016 Course and Contact Information Instructor: Dr.
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics
Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationSyllabus of ENPM 691: Secure Programming in C
Syllabus of ENPM 691: Secure Programming in C Spring Semester 2018 Instructor: Dharmalingam Ganesan, PhD Contact: dganesan@umd.edu Class hours: Thursday 7:00 PM to 9:40 PM Class location: TBA Course Description:
More informationCOMP Data Structures
COMP 2140 - Data Structures Shahin Kamali Topic 1 - Introductions University of Manitoba Based on notes by S. Durocher. COMP 2140 - Data Structures 1 / 35 Introduction COMP 2140 - Data Structures 1 / 35
More informationCMPE 150/L : Introduction to Computer Networks
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 1 Slides source: Kurose and Ross, Simon Lam, Katia Obraczka Introduction 1-1 Notetaker Position
More informationSan José State University Computer Science Department CS157A: Introduction to Database Management Systems Sections 5 and 6, Fall 2015
San José State University Computer Science Department CS157A: Introduction to Database Management Systems Sections 5 and 6, Fall 2015 Course and Contact Information Instructor: Ron Gutman Office Location:
More informationINF 315E Introduction to Databases School of Information Fall 2015
INF 315E Introduction to Databases School of Information Fall 2015 Class Hours: Tuesday & Thursday10:30 am-12:00 pm Instructor: Eunyoung Moon Email: eymoon@utexas.edu Course Description Almost every website
More informationCSci 4211: Data Communications and Computer Networks. Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits
CSci 4211: Data Communications and Computer Networks Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office:
More informationESET 369 Embedded Systems Software, Fall 2017
ESET 369 Embedded Systems Software, Fall 2017 Syllabus Contact Information: Professor: Dr. Byul Hur Office: Fermier 008A Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu
More informationObject-Oriented Programming for Managers
95-807 Object-Oriented Programming for Managers 12 units Prerequisites: 95-815 Programming Basics is required for students with little or no prior programming coursework or experience. (http://www.andrew.cmu.edu/course/95-815/)
More informationJustification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.
CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course
More informationSan José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018
Course and Contact Information Instructor: Office Location: San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Fabio Di Troia DH282 Telephone: 408-924-7171
More informationElements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy
Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted
More informationSoftware Reliability and Reusability CS614
Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program
More informationECE Object-Oriented Programming using C++ and Java
1 ECE 30862 - Object-Oriented Programming using C++ and Java Instructor Information Name: Sam Midkiff Website: https://engineering.purdue.edu/~smidkiff Office: EE 310 Office hours: Tuesday, 2:30 to 4:00
More informationWeb Programming Fall 2011
Web Programming Fall 2011 Course number: M&IS 24065 Section: 002 CRN: 23080 Location: BSA 110 Meeting Day: TR Meeting Time: 12:30-1:45 Instructor Information: Name: Professor Janet Formichelli, MS E-mail:
More informationBOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus
BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus 1. Course Objectives Welcome to MET CS342 Data Structures with Java. The intent of this
More informationCS535: Interactive Computer Graphics
CS535: Interactive Computer Graphics Instructor: Daniel G. Aliaga (aliaga@cs.purdue.edu, www.cs.purdue.edu/homes/aliaga) Classroom: LWSN B134 Time: MWF @ 1:30-2:20pm Office hours: by appointment (LWSN
More informationCOMP Data Structures
Shahin Kamali Topic 1 - Introductions University of Manitoba Based on notes by S. Durocher. 1 / 35 Introduction Introduction 1 / 35 Introduction In a Glance... Data structures are building blocks for designing
More informationSan José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017
San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017 Course and Contact Information Instructor: Prakash Atawale Office Location: DH 282
More informationTextbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none
CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description
More informationCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai
More informationCS 235AM, Mobile Application Development: Android Spring 2016
CS 235AM, Mobile Application Development: Android Spring 2016 Sections CRN 44555 & 44036 Credits 4 Classroom 19/132 Day & Time M, W 8:00 9:50 Instructor Brian Bird Office Building 19, Room 152 Office Phone
More informationC - Cryptography
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2018 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).
More informationCOSC 115A: Introduction to Web Authoring Fall 2014
COSC 115A: Introduction to Web Authoring Fall 2014 Instructor: David. A. Sykes Class meetings: TR 1:00-2:20PM in Daniel Building, Room 102 Office / Hours: Olin 204E / TR 8:00-10:45AM, MWF 9:00 10:20AM,
More informationElements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy
Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted
More informationCourse Description. This course combines semesters three and four of the Cisco Networking Academy CCNA
Cabrillo College Syllabus: CIS 83 Fall 2013 Section 83928 Gerlinde Brady Phone: 831-477-5672 Office: Room 827 Class Meetings: Wednesdays 1:30 pm 3:30 pm online via CCCConfer and 2 hours recorded lecture
More informationSyllabus. Computer Science Information Technology 975. Information Storage and Management for Computer Networks
Syllabus Computer Science Information Technology 975 Information Storage and Management for Computer Networks Course: CSIT 975, 8525, Fall 2015, 3 Units Instructor: Associate Professor Marcus Butler E-mail:
More informationCity University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2016/17 Part I Course Overview Course Title: Information Security for ecommerce Course Code: CS5285 Course
More informationC - Cryptography
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).
More informationElements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy
Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 2 Due: Friday, 10/28/2016 at 11:55pm PT Will be posted on
More informationBSc (Honours) Computer Science Curriculum Outline
BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is
More informationCOMP 401 COURSE OVERVIEW
COMP 401 COURSE OVERVIEW Instructor: Prasun Dewan (FB 150, help401@cs.unc.edu) Course page: http://www.cs.unc.edu/~dewan/comp401/current/ COURSE PAGE Linked from my home page (google my name to find it)
More informationINFORMATION TECHNOLOGY, BS
Information Technology, BS 1 INFORMATION TECHNOLOGY, BS Banner Code: VS-BS-INFT Academic Advising 5400 Nguyen Engineering Building Fairfax Campus 101 Bull Run Hall Science and Technology Campus Phone:
More informationTest Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,
Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code
More informationECE646 Fall Lab 1: Pretty Good Privacy. Instruction
ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All
More informationIn this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".
**Disclaimer** This syllabus is to be used as a guideline only. The information provided is a summary of topics to be covered in the class. Information contained in this document such as assignments, grading
More informationDepartment of Computer Science
Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer
More informationIntroduction to Data Structures
15-121 Introduction to Data Structures Lecture #1 Introduction 28 August 2019 Margaret Reid-Miller Today Course Administration Overview of Course A (very basic) Java introduction Course website: www.cs.cmu.edu/~mrmiller/15-121
More informationCSCI 4250/6250 Fall 2013 Computer and Network Security. Instructor: Prof. Roberto Perdisci
CSCI 4250/6250 Fall 2013 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250 What is the purpose of this course? Combined Undergrad/Graduate Intro to Computer
More informationECE 467 Section 201 Network Implementation Laboratory
ECE 467 Section 201 Network Implementation Laboratory Spring 2015 Class Meets: Day: Wednesday Time: 4:30 PM to 7:10 PM Where: Johnson Center, Room G10C Instructor: Ben Allen My Contact Information: E-mail
More informationSUMMARY OF INFORMATION ON EACH COURSE
1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level
More informationPublic-Key Cryptography
Computer Security Spring 2008 Public-Key Cryptography Aggelos Kiayias University of Connecticut A paradox Classic cryptography (ciphers etc.) Alice and Bob share a short private key using a secure channel.
More informationSULTAN QABOOS UNIVERSITY COURSE OUTLINE PROGRAM: B.Sc. in Computer Science. Laboratory (Practical) Field or Work Placement
SULTAN QABOOS UNIVERSITY COURSE OUTLINE PROGRAM: B.Sc. in Computer Science 1. Course Code COMP4201 2. Course Title INTRODUCTION TO DATABASE SYSTEMS 3. Credits 3 4. Pre-requisite Course(s) COMP3203 - Introduction
More informationBeijing Jiaotong University CS-23: C++ Programming Summer, 2019 Course Syllabus
Beijing Jiaotong University CS-23: C++ Programming Summer, 2019 Course Syllabus Course Personnel: Instructor Name: Jovan Ilić Office: TBD Phone: TBD e-mail: TBD Teaching Assistants Name: TBD Office: TBD
More informationFIT5044 Network security. Unit Guide. Semester 1, 2010
FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained
More informationGerlinde Brady Phone: Office Hours: see Web at:
Cabrillo College Syllabus: CIS 83 Fall 2015 Section 89004 Gerlinde Brady Phone: 831-477-5672 Class Meetings: TUE 6:00 pm 8:05 pm (829) & 2 hours online Office: Room 827 D Office Hours: see Web at: http://babyface.cabrillo.edu/salsa/listing.jsp?staffid=156
More information