The quiz will be given on Feb/10. It is open notes and open books. Please be prepared.
Papers have been assigned to all student for the in-class presentation. Click here to find the paper assigned to you
|
Instructor: |
Dr. Yao Liu |
||||||||||||||
|
|
|
||||||||||||||
|
Class location: |
CPR 251 |
||||||||||||||
|
Day and time: |
MW 2:00pm - 3:15pm |
||||||||||||||
|
Students registered for CIS 6930 need to complete a research project in addition to the assignments |
|||||||||||||||
|
Project reports must be typed using a text editor and submitted through Canvas. Homework assignments and paper summaries are suggested to be typed using a text editor, and they must be submitted in hard copies. Important Date: |
||||||||||||||
| Term paper : | Each student is required to
complete a survey paper or a research paper. Each student needs to submit a
proposal in the middle of the semester and the final version by the end of the
semester. Students can form teams, each with up to three
members. You may want to format your proposal and reports according to the following templates. If you are a Microsoft Word user, use this template. If you are a LaTeX user, use this template. The requirement of the project |
||||||||||||||
| In-class Presentation: | Each student is required to give a
presentation on a research paper assigned by the instructor. |
||||||||||||||
|
Each student is required to complete and
submit summaries of reading papers to be discussed in class. |
||||||||||||||
Assignment: |
Assignment handed out on 02/08/2016 and due on 02/29/2016 3:15pm |
Date |
Topics |
Reading |
Handouts |
01/20/16 |
Introduction |
||
01/25/16 |
Network Security Basics |
||
01/27/16 |
Cont'd |
||
02/01/16 |
Hash-based Primitives |
R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages 218-239, 1990. A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp. 151--165 |
|
02/03/16 |
Secret sharing |
A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, pages 612-613, 1970. Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, 1989. |
|
02/08/16 |
Secret handshake |
D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong."Secret handshakes from pairing-based key agreements" In IEEE Symposium on Security and Privacy, 2003. C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December 2004. |
Yao Liu (yliu@cse.usf.edu)