EE6032: Comms - PowerPoint PPT Presentation

1 / 8
About This Presentation
Title:

EE6032: Comms

Description:

http://www.ecestudents.ul.ie/ MEng INsec. Module:EE6432. Semester: 15 weeks ... Students will be judged on effort, progress and degree of learning demonstrated. ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 9
Provided by: tomco91
Category:

less

Transcript and Presenter's Notes

Title: EE6032: Comms


1
  • EE6032 Comms Security Protocols
  • General Information
  • Professor Tom Coffey
  • Jan 2009

2
  • General information
  • Lecturer Professor Tom Coffey
  • Email tom.coffey_at_ul.ie
  • Web page
  • http//www.ecestudents.ul.ie/
  • MEng INsec
  • ModuleEE6432
  • Semester 15 weeks
  • Examinations weeks 14 15
  • Module Assessment
  • End of semester examination 70
  • Continuous Assessment (Class assignments) 30

3

Recommended Textbooks
W.Stallings, Cryptography and Network Security,
4th Edition Pearson-Prentice-Hall, 2006. C.
Boyd and A.Mathuria, Protocols for Authentication
and Key Establishment. Springer, 2003 Russel
Dean Vines, Wireless Security Essentials.
Defending Mobile Systems from Data Piracy. Wiley,
2002.
4
  • EE6032 Outline Syllabus
  • Security Services
  • Role of security services in countering network
    attacks
  • Cryptographic components
  • Public key infrastructures
  • Security Protocols
  • Security protocol design
  • Use of formal methods for evaluation of
    correctness of security of protocols.
  • Wireless Internet Security Standards

5
  • EE6032 Class Assignments
  • Students are asked to take One project from a
    selected list. Student should prepare a technical
    paper of 6 pages max (.doc or html ) on the
    operation of, or developments in, the selected
    topic.
  • Student should also prepare a brief presentation
    (4 slides max -in PowerPoint or PDF format)
    emphasizing the main issues in the paper. Each
    student will be asked to make a short
    presentation using presentation slides in week
    12 of term.
  • An electronic copy of the technical paper and
    Presentation slides should be submitted by email
    to tom.coffey_at_ul.ie, no later than week 11
    (12-04-2009) of term.
  • The main purpose of the project is to aid student
    learning and development of a research
    methodology !!!
  • Students will be judged on effort, progress and
    degree of learning demonstrated.

6
  • EE6032 Class Assignments (ii)
  • Technical Paper
  • Paper Structure ltpaper titlegt, lt authors
    namegt, lt IDgt, ltabstract ( max 50 words)gt,
  • ltbody of papergt, ltlist of referencesgt
  • No of pages 6 (max)
  • Paper Format Two columns, font size 12,
    single-line spacing. )
  • PowerPoint Slide Presentation of Paper
  • 4 slides (max)
  • Submission
  • Email to tom.coffey_at_ul.ie.
  • Submission Deadline
  • Week 11 (12th April, 2009).
  • Date for student Presentation of paper
  • To be announced

7
  • EE6032
  • 2009 Class Assignments Topics
  • Survey of Electronic Voting Systems
  • Blind Signatures and their Application
  • Handling Dispute Arbitration for Non-Repudiation
    Schemes
  • A Practical Secret Ballot Voting Scheme for Large
    Scale Elections
  • On-Line Electronic Voting over the Internet
  • Preventing Man-in-the Middle attacks in Security
    Protocols
  • Untraceable Electronic Mail
  • Secure User Identification using smart cards
  • Zero-Knowledge Protocols for User Identification
  • Comparative Analysis of Hashing Algorithms
    suitable for Wireless Applications

8
  • EE6032
  • 2009 Class Assignments Topics
  • Stream ciphers and their application in
    Wireless-networked devices
  • The role of Penetration Testing in determining
    vulnerabilities in security applications
  • Denial of service attacks in Wireless LANS
  • Bluetooth ( peer-to-peer protocol) A security
    review
  • A Security review of the Wireless Application
    Protocol (WAP)
  • Secure Key management techniques for satellite
    communication systems
  • Formal verification of security protocols using
    State-Space (or strand-based) techniques.
  • Analysis of Access Control and Privacy Wired
    Equivalent Privacy (WEP) features for IEEE802.11
    Standard
  • Data Storage security issues for Modern (Smart)
    Electronic Passports
  • Secure remote access over the internet using
    IPSec
  • Security Protocols and Services for IPV6
  • Authentication and Confidentiality using IPSec
  • Other Titles If you have another title which you
    wish to propose, please email me with Title and
    Abstract (25 words max ) of paper.
Write a Comment
User Comments (0)
About PowerShow.com