Nov 22, 2010 - Project
write-ups are due on Dec 19.
Our increasingly networked world and the upcoming of new technologies,
such as RFID, trusted computing, or electronic voting, raise many
challenges. The goal of this course is to make students aware of these
challenges and to introduce them to current research in computer and
communications security. Students will also learn basic principles in
security and cryptography. The course assumes a basic knowledge of
computers, networks, and distributed systems, but does not assume any
prior knowledge of security or cryptography.
The instructor will give several introductory lectures devoted to basic
security and cryptography. In the following lectures, two students will
present a research paper and lead a short discussion on the paper. The
presentation should be conference-style and take about 25 minutes,
which will leave about 15 minutes for discussion. See the reading list for a list of the discussed
topics. Each presenter should submit his/her slides before the lecture
to the instructor. The plan is to have each student give two presentations.
All students should read one of the two assigned papers prior to a lecture and
a short review for it.
The reviews are due before class
on the day of the presentation of a paper. The (anonymized) reviews
will be accessible by the other students. The presenter of a paper
does not have to submit a review for his/her paper. (He/she
should still submit a review for the other student's presentation, see below.)
Giving oral presentations is an important skill that grad students
should train during graduate school. Feedback is essential for this
training. Therefore, after every lecture, all students should submit a review for both
presentations. The reviews are due at
5pm the day after a presentation. A presenter will
have access to her/his (anonymized) reviews.
Students will work in groups of two on a project in which
they will undertake novel privacy or security research. Possible ideas for projects will be mentioned
in class. Students will have to submit a proposal, present their work
in class at the end of the term, and write a workshop-quality
report. The report should be formatted using one of the ACM
templates (option 1
for LateX users). The report should not have more than 10 pages,
excluding the bibliography. A PDF of the report should be emailed to
the instructor by Dec 19.
Class participation (including presentation feedback)