CIS 6930 Emerging Topics in Network Security

Spring 2016

The quiz will be given on Feb/10. It is open notes and open books. Please be prepared.
Papers have been assigned to all student for the in-class presentation. Click here to find the paper assigned to you

Instructor:

Dr. Yao Liu

 

Office hours:

MW 11:00am - 12:30pm, ENB 336

Office phone:

813-974-1079

Email address:

yliu@cse.usf.edu

Homepage:

http://www.cse.usf.edu/~yliu/

 

TA:

Tao Wang

Office hours :

2:00~3:30 pm on Wednesdays ENB 213

Email:

taow@mail.usf.edu

Class location:

CPR 251

Day and time:

MW 2:00pm - 3:15pm

Course Syllabus

Students registered for CIS 6930 need to complete a research project in addition to the assignments


Note on assignments:

Project reports must be typed using a text editor and submitted through Canvas. Homework assignments and paper summaries are suggested to be typed using a text editor, and they must be submitted in hard copies.

Important Date:

Proposal due: Feb/20/16
Interim report: March/27/16
Final submission due: midnight EST, April/20/16

Term paper : Each student is required to complete a survey paper or a research paper. Each student needs to submit a proposal in the middle of the semester and the final version by the end of the semester. Students can form teams, each with up to three members. You may want to format your proposal and reports according to the following templates.

If you are a Microsoft Word user, use this template.
If you are a LaTeX user, use this template.
The requirement of the project

In-class Presentation:

Each student is required to give a presentation on a research paper assigned by the instructor.
Here is the grading form for the in-class presentation


Paper summaries:


Each student is required to complete and submit summaries of reading papers to be discussed in class.

Assignment:

Assignment handed out on 02/08/2016 and due on 02/29/2016 3:15pm

Schedule of classes (filled in as the semester progresses)

Date
Topics
Reading
Handouts
01/20/16
Introduction
01/25/16
Network Security Basics
01/27/16
Cont'd
   
02/01/16
Hash-based Primitives

R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages 218-239, 1990.

Bloom filter (Wikipedia)

A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp. 151--165

02/03/16
Secret sharing

A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, pages 612-613, 1970.

Secret Sharing on Wikipedia

Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, 1989.

02/08/16
Secret handshake

D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong."Secret handshakes from pairing-based key agreements" In IEEE Symposium on Security and Privacy, 2003.

C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December 2004.

 

Yao Liu (yliu@cse.usf.edu)