Welcome to M2 SCCI Promotion Horst Feistel

Size: px
Start display at page:

Download "Welcome to M2 SCCI 2015-2016 Promotion Horst Feistel"

Transcription

1 Welcome to M2 SCCI Promotion Horst Feistel Horst Feistel( )

2 Grenoble University SCCI - M2P / M2R Security, Cryptology and Coding of Information Systems - Sécurité, Cryptologie et Codage des Systèmes d Information Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who s who

3 Cybersecurity Context : digital world, pervasive systems, big data Confidentiality, Authentication, Integrity, Non-repudiation Various applications and professional skills: Enterprise specialised in security: solutions providers (hardware, software, smartcard, ); security audit, Specialized department of a company : bank, e-business, telecom,tv, Information system within a company: network/system administration Professional and personal data protection 1 year dedicated program at Grenoble University (UJF+INP) Ensimag, Institut Fourier, UFR IMAG Objective : formation of experts in security and coding technologies Cryptology : mathematical protocols (RSA, AES, ECC ) Security: software/hardware (network, system, integraton) Applications : watermarking, multimedia, smartcard, M2P : Directed to profession: sept-march=lectures+training / apr-sept project M2R : Directed to research: sept-jan=lectures+training / feb-june project

4 Brief history & organization Master UJF-INPG Cryptologie, Sécurité, Codage de l Information (2001 ) Sept 2003: first promotion: 17 graduate students 290 graduate students up to sept 2015, From Sept 2007: international M2P program taught in English From sept 2008: part of MOSIG International Master; Sept 2011: 10 years birthday : From sept 2011: M2P, M2R, ( SAFE ) From 2016 : M2 Cybersecurity M2P+R Security, Cryptology and Coding of Information Systems Gathers French and English speaking students Director UJF/IF : Jean-Guillaume Dumas, Vanessa Vitse, Philippe.Elbaz-Vincent at ujf-grenoble.fr, Director INP/ENSIMAG: Jean-Louis.Roch at imag.fr Web:

5 M2P mid-sept->march: courses (level 3) [2 weeks optional pretraining early sept] April -> September : (level 4) full-time internship (Master thesis) mid-june: mid-term presentation In English! mid-september: defense Calendar M2R mid-sept->january: courses (level 3) February-> June: (level 4) full-time internship (Master thesis) mid-june: defense Validation: by level (~semester) Mark 10/20=50% to level 3 (courses) No mark < 7 in global units Mark 10/20=50% to level 4 (thesis/project) Warning! Internships must be validated by J.-G. D. / V. V (for UJF) or J.-L. R (for INP). Furthermore, academic supervisor for the internships are also chosen by the directors.

6 M2P and M2R courses Common core: cryptology and security [15 ECTS] Models for security Symmetric and asymmetric cryptology - PKI infrastructures System administration and network security Elective specialization [12 ECTS] : choose one between Security of Information Systems [12 ECTS] Advanced system and network security Secure hardware architecture Distributed algorithms and fault-tolerance Secure infrastructure deployment project Cryptology, coding and multimedia applications [12 ECTS] Advanced cryptology: elliptic curves, cryptanalysis Multimedia applications, watermarking Coding and fault-tolerance Elective course unit [3 ECTS] : choose one between Smart card security; audit and normalization [3 ECTS] New trends in cryptology: quantum, biometrics, homomorrphic encryption [3 ECTS] Master thesis [27 ECTS] Note: early september: Specific optional introduction courses Math [group theory,arithmetics]; linux & programming ; information systems [UML]

7 27 ECTS Master thesis Academic Program M2P SCCI (M2-P) 3 ECTS UE Transversal (English / French / ) 30 ECTS scientific/technology 15 ECTS Common Core 12 ECTS Elective Specialization in Security ( math or info ) 3 ECTS = elective unit (2 proposed, but yet open to all units proposed in Grenoble M2 Math-Info)

8 Security, Cryptology and Coding of Information Systems M2P SCCI 2015/2016 Academic Program Non-elective Core Courses 18 ECTS ECTS Teaching teams - Security models: proofs, protocols and politics 6 Autreau, Ene, Kumar, Roch - Symmetric and asymmetric cryptology PKI 6 Dumas,Elbaz-Vincent,Lauradoux&guests - System administration and network security 3 Mounié, - English or French 3 Pool Langues Choose one of the two following elective 12 ECTS Elective A. Security of systems and infrastructures - Advanced security of system and networks - Hardware and embedded secure architectectures - Distributed algorithms and fault-tolerance - Deployment of a secure grid infrastructure Elective B. Cryptology, coding and multimedia - Advanced cryptology:elliptic curves, cryptanalysis - Multimedia applications and watermarking - Error correcting codes and fault-tolerance Wagner, Castellucia Maisri Lachaize, Wagner Vitse Cayre, Ebrahimi Pernet; Roch; Patchichkine, Brossier Choose one of the two following elective 3 ECTS - Elective 1. Smart card security, certif. and norms 3 Autreau, Guillemet - Elective 2. New trends in cryptography 3 Malha, Mainguet, Vitse

9 Academic Program M2R SCCI 27 ECTS Master thesis 3 ECTS UE Transversal (English / French / ) 30 ECTS scientific/technology 24 ECTS Common Core 6 ECTS elective unit (2 units of 3 ETCS proposed, but yet open to all units proposed in Grenoble M2 Math-Info)

10 Security, Cryptology and Coding of Information Systems M2R SCCI 2015/2016 Academic program Non-elective Core Courses 18 ECTS ECTS Teaching teams - Security models: proofs, protocols 6 Ene, Roch - Symmetric and asymmetric cryptology PKI 6 Dumas,Elbaz-Vincent,Lauradoux&guests - Security of computer systems and networks * System administration and network security (3) * Advanced security of system and networks (3) 6 Castellucia,, Wagner - Advanced cryptology:elliptic curves, cryptanalysis 6 Vitse - English or French (FLE) 3 Pool Langues Elective scientific module/units : 6 ECTS - Requires validation from M2R SCCI academic supervisors. Timetable compatibility is guaranteed for both following units (3 ECTS each) : * Smart card security, certif. and norms (3 ECTS) * New trends in cryptography (3 ECTS) 6 Autreau, Guillemet, Malha, Mainguet, Vitse - M2R Thesis 27

11 Courses and M2P trainings 1 ECTS Scientific Unit = 10h attendency M2 Courses slots of 1.5 hours per week per student: 8h-9h30 / 9h45-11h15 / 11h30-13h 13h45-15h15/15h30-17h M2P 3 ECTS = 30H classes / 45H practical work + Homework 18h lectures in English (~ 2 slots of 1h30 / week) + 12h training : TP/ Exercises/complts If enough students, may be given twice: 1 group in English + 1 group in French => for each unit, choose either French or English, once! M2R: courses, homework, no training / TP Additional tutoring (office hours) on request: see your professors

12 Validation / Graduation Two semesters / periods S3 (30 credits) : Courses S4 (30 credits): Master thesis (internship) + English (or French) Each semester has to be validated : Requirements for S3 validation : In each module: global mark 7/20 (35%) Global average mark (GPA) on S3 10/20 (50%) Requirements for S4validation : Master thesis mark 10/20 (50%) English: B2 level (Alt or Full) IMPORTANT: No compensation between semesters Except if the candidate has a GPA in S3 (courses) 9.75 and no mark < 7 in some module For honours: the Master degree includes the 4 semesters (M1 and M2)

13 Programme = M2 (P ou R) Elèves-ingénieur (inscription en 3A -pas Master-) Anglais suivi à l ENSIMAG (+ 2eme langue) Validation REX (le 3/10 après-midi) / simulation gestion Stage 2A à valider Elective unit: NTC ou «smart card security» PFE + Thèse Master (juil pou R, sept pour P) Facultatifs: Sport, LV2, Définir programme suivi: choix M2R ou choix M2P

14 Academic supervisors: Contacts and links (UJF) Jean-Guillaume Dumas Vanessa Vitse Philippe Elbaz-Vincent (INP) Jean-Louis Roch Registration / Scholastic secretaries UJF / IM2AG : Cécile Gros Cecile.Gros@ujf-grenoble.fr INP / Ensimag : Elena Leibowitch Elena.Leibowitch@imag.fr Links SCCI web server: Kiosk: Mail: scci@ensimag and m2scci.im2ag@ujf-grenoble.fr

15 Calendrier Calendrier M2P et R SCCI Semaine Début Fin Lundi Mardi Mercredi Jeudi Vendredi 38 14/09/ /09/2015 Compléments Math - Info Compléments Math - Info Compléments Math - Info Compléments Math - Info Compléments Math - Info 39 21/09/15 25/09/15 Rentrée M2PR à 11h en Amphi H- Ensimag Inscription administrative /09/15 02/10/ /10/15 09/10/ /10/15 16/10/ /10/15 23/10/ Forum Ensimag /10/15 30/10/15 V V V V V 45 02/11/15 06/11/ /11/15 13/11/ V 6 7 / APM Toeic blanc Ensimag 47 16/11/15 20/11/ / APM AMNECYS /11/15 27/11/ Semestre /11/15 04/12/ /12/15 11/12/ /12/15 18/12/ /12/15 25/12/15 V V V V V 53 28/12/15 01/01/16 V V V V V 1 04/01/16 08/01/ /01/16 15/01/16 Examens session 1, M2P/R Examens session 1, M2P/R Examens session 1, M2P/R Examens session 1, M2P/R Examens session 1, M2P/R Fin cours M2R 3 18/01/16 22/01/ Forum UJF /01/16 29/01/ /02/16 05/02/ / AMP Toeic Ensimag /02/16 12/02/ /02/16 19/02/ /02/16 26/02/16 V V V V V 9 29/02/16 04/03/16 Examens session 1, M2P Examens session 1, M2P Examens session 1, M2P Examens session 1, M2P Examens session 1, M2P Fin cours M2P 10 07/03/16 11/03/16 stage stage stage stage stage 11 14/03/16 18/03/16 stage stage stage stage stage 12 21/03/16 25/03/16 stage stage stage stage stage 13 28/03/16 01/04/16 Jury Semestre 3, session 1 stage stage stage stage 14 04/04/16 08/04/16 stage stage stage stage stage 15 11/04/16 15/04/16 stage stage stage stage stage 16 18/04/16 22/04/16 stage stage stage stage stage 17 25/04/16 29/04/16 stage stage stage stage stage 18 02/05/16 06/05/16 stage stage stage stage stage 19 09/05/16 13/05/16 stage stage stage stage stage 20 16/05/16 20/05/16 stage stage stage stage stage 21 23/05/16 27/05/16 stage stage stage stage stage 22 30/05/16 03/06/16 stage stage stage stage stage Semestre /06/16 10/06/16 stage stage stage stage stage 24 13/06/16 17/06/16 stage stage stage stage stage 25 20/06/16 24/06/16 Soutenances Soutenances Examens session 2 Examens session 2 Examens session /06/16 01/07/16 stage Jury Semestre 4, session 1 stage stage stage 27 04/07/16 08/07/16 stage stage stage stage stage 28 11/07/16 15/07/16 Jury Diplôme, session 1 stage stage stage stage 29 18/07/16 22/07/16 stage stage stage stage stage 30 25/07/16 29/07/16 stage stage stage stage stage 31 01/08/16 05/08/16 stage stage stage stage stage 32 08/08/16 12/08/16 stage stage stage stage stage 33 15/08/16 19/08/16 stage stage stage stage stage 34 22/08/16 26/08/16 stage stage stage stage stage 35 29/08/16 02/09/16 Soutenances Soutenances Soutenances Soutenances Soutenances 36 05/09/16 09/09/16 Jury Sem. 3 + Sem. 4, session /09/16 16/09/16 Jury Diplôme, session /09/16 23/09/16 Calendrier-M2PR-SCCI /1

16 Timetable ADE : HowTo If you do not have an Agalan INP login+pwd : Or if you have an AGALAN login+pwd: Direct access all Master courses in Grenoble (or ) M2R SCCI (lectures from mid-september to january) : copy-paste in your browser the url : with INP Agalan login+pwd: plannings/direct_planning.jsp?resources=13289 M2P SCCI (lectures from mid-september to march) plannings/direct_planning.jsp?resources=13291

17 REGISTRATION and very important dates Now: each student : has to sign two IT charts : INP and UJF and provides the track choice (M2P or M2R) 22 september : deadline for administrative registration (in your institution, either INP or UJF) While not registered => no login, no Kiosk, no ADE! INP students: photo for trombinoscope : 21/09 13h30,room D115 Ensimag UJF students: test d'anglais aura lieu le 21/09 à 15h au DLST (Enseignante : Emmanuelle.Esperanca-Rodier@ujf-grenoble.fr) ; 1 st October: deadline to change track choice: M2P or M2R

18 Important points Charts Registration Individual interviews (on demand, current october) Internship / Master Thesis Curriculum vitae ready Prospection / application : from early October

19 Other contacts SECURIMAG club CELAIO : Carole.Durand@ujf-grenoble.fr Relations with companies CV, internship contracts, International : Cecile.Garatti@ujf-grenoble.fr ri.im2ag@ujf-grenoble.fr

20 Questions?

21 Examples of Master thesis Integration of zero-knowledge authentication on smart card [C-S] Secure server for SIP telecommunications [INRIA] Integration of strong authentication in an information system [British Telecom] Management of identity for printer access [Helwett-Packard, Germany] Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] Conception et réalisation d un composant de sécurité [Ministère Défense, Paris] Analysis and deployment of a confidential data service [Solucom, Nantes] Integration of biometrics in crypto protocols [SAGEM, Paris] Hidden channel attacks [SAGEM, Paris] Windows CardSpace components in a smart card [Gemalto, La Ciotat] Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat] Lightweight electronic signature [Dictao, Paris] Wireless infrastructure for emergency comm. [Wisecomm, Germany] Secure and anonymous communication on internet [UL, Luxembourg] Test of crypto-secure random generators [LTSI, Lyon] Security analysis of a medical data protection scheme [Philips, Eindhoven] Supervision of the CEA computer infrastructure [CEA, Grenoble] Security analysis of images watermarking [GIPSA, Grenoble] Security audit of the SCADA platform [Atos Origin, Grenoble].

Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman

Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman David A. Huffman(1925-1999) [Photo: Don Harris] Grenoble University SCCI - M2P / M2R Security, Cryptology and Coding of Information Systems -

More information

Masters of Science in Informatics at Grenoble

Masters of Science in Informatics at Grenoble Masters of Science in Informatics at Grenoble Plan Objective and approach Overview of program Action Plan Provisions for Sept 2008 Academic program and teaching teams 1 Objective and Approach Objectives:

More information

Welcome to: M2R Informatique & MoSIG Master of ScienceSep. in Informatics 18, 2009 Joseph 1 / 1Fou

Welcome to: M2R Informatique & MoSIG Master of ScienceSep. in Informatics 18, 2009 Joseph 1 / 1Fou Welcome to: M2R Informatique & MoSIG Master of Science in Informatics Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://www-ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr Sep.

More information

Project Informations Master s degree in Computer Science (by research) M2R Info. in short

Project Informations Master s degree in Computer Science (by research) M2R Info. in short Project Informations Master s degree in Computer Science (by research) M2R Info. in short Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr

More information

ACADEMIC GUIDE SMSc SN 2013-03

ACADEMIC GUIDE SMSc SN 2013-03 ACADEMIC GUIDE SMSc SN 2013-03 www.supinfo.com Copyright SUPINFO. All rights reserved SUPINFO Academic Management Avril 2011 Version 1.0 Academic Book Specialized Master of Science - System & Networks

More information

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company.

More information

UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS. Master Degree Programme Section LM-17

UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS. Master Degree Programme Section LM-17 UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS Master Degree Programme Section LM-17 DM 270/2004, art.12 R.D.A. art. 5 1 Art. 1 General rules and objectives

More information

Master of Business Management

Master of Business Management Master (Master Administration des Entreprises of the University of Lorraine) The master (2 semesters) International Track General Track isam-iae.univ-lorraine.fr University Diploma in (1 semester in English)

More information

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM The approved (by ACHE in 12/2009) and accredited (by SACS in 12/2010) Master of Science degree program in Cybersystems and Information Security will

More information

Module 1: e- Learning

Module 1: e- Learning Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge

More information

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10

More information

DOUBLE BACHELOR'S DEGREE IN ECONOMIC SCIENCES / LANGUAGES (ENGLISH, GERMAN)

DOUBLE BACHELOR'S DEGREE IN ECONOMIC SCIENCES / LANGUAGES (ENGLISH, GERMAN) Academic year 2014/2015 DOUBLE BACHELOR'S DEGREE IN ECONOMIC SCIENCES / LANGUAGES (ENGLISH, GERMAN) Domaine(s) ARTS - LITERATURE - LANGUAGES, LAW - ECONOMY- MANAGEMENT General informations Fields Length

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

GTEM TRAINING PROGRAM

GTEM TRAINING PROGRAM GTEM TRAINING PROGRAM 1. Overview The Training Program consist of five modules, which are given in Table 1. A broad description of Table 1: Training modules and dependencies T1: General mathematical skills

More information

Curriculum Vitae. Claude Barral. 1984 1988 Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France

Curriculum Vitae. Claude Barral. 1984 1988 Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France Curriculum Vitae Address n o 6 La Bastide Samat 13119 Saint Savournin, France Phone: +33.4.42.32.36.92 Mobile Phone: +33.6.86.83.19.55 Email: claude.barral@gmail.com Homepage: http://www.linkedin.com/in/cbarral

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016

INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016 INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016 Welcome to Toulouse Business School Master in Management (Grande Ecole) Program International Relations Office 1 TABLE OF CONTENTS YOUR

More information

INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016

INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016 INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016 Welcome to Toulouse Business School Master in Management (Grande Ecole) Program International Relations Office 1 TABLE OF CONTENTS YOUR

More information

INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2014-2015

INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2014-2015 INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2014-2015 Welcome to Toulouse Business School Master in Management (Grande Ecole) Program International Relations Office 1 TABLE OF CONTENTS LIST

More information

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: anca.nitulescu@ens.fr Occupational field Cryptography: Provable Security for Protocols I have

More information

Master informatique 2 e année Spécialité Recherche en informatique - MRI

Master informatique 2 e année Spécialité Recherche en informatique - MRI Master informatique 2 e année Spécialité Recherche en informatique - MRI http://master.irisa.fr Welcome presentation 2014-2015 Sandrine Blazy, Valérie Gouranton, m2r_resp@irisa.fr 1 Outline Generalities

More information

STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire 2010-2011)

STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire 2010-2011) Institut d Administration des Entreprises SOCRATES/ERASMUS APPLICATION DEADLINE : 20th November 2010 OTHER (Autre) STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

Global Identity Management of Virtual Machines Based on Remote Secure Elements

Global Identity Management of Virtual Machines Based on Remote Secure Elements Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management

More information

Welcome presentation 2012-2013

Welcome presentation 2012-2013 http://master.irisa.fr Welcome presentation 2012-2013 Isabelle Puaut, Valérie Gouranton m2r_resp@irisa.fr 1 Generalities Curriculum organization and structure Planning of the year Selection of core modules

More information

M.Tech. Software Systems

M.Tech. Software Systems M.Tech. Software Systems Input Requirements Employed professionals holding an Integrated First Degree of BITS or its equivalent in relevant disciplines, with minimum one year work experience in relevant

More information

Marianne.Hoyez-Genet@u-bourgogne.fr School : Dijon Institute of Business Administration (IAE Dijon - UFR Economie - Gestion)

Marianne.Hoyez-Genet@u-bourgogne.fr School : Dijon Institute of Business Administration (IAE Dijon - UFR Economie - Gestion) Niveau : Domaine : Mention : Spécialité: DROIT-ECONOMIE-GESTION SCIENCES DU MANAGEMENT ( Sciences) MIB Master in International Business Volume horaire étudiant : 494 h (Administration des entreprises)

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

DROIT-ECONOMIE-GESTION. Formation dispensée en : marianne.hoyez-genet@u-bourgogne.fr bertrand.belvaux@u-bourgogne.fr

DROIT-ECONOMIE-GESTION. Formation dispensée en : marianne.hoyez-genet@u-bourgogne.fr bertrand.belvaux@u-bourgogne.fr Niveau : Domaine : Mention : Spécialité : DROIT-ECONOMIE-GESTION SCIENCES DU MANAGEMENT (Management Sciences) IMBS International Master in Business Studies (Administration des Enterprises) Volume horaire

More information

International Exchange Programmes Fact Sheet 2014 2015 Lille & Nice Campuses

International Exchange Programmes Fact Sheet 2014 2015 Lille & Nice Campuses International Campus in Lille Mailing address : ESPEME/EDHEC Business School 24 Avenue Gustave Delory CS 50411 59057 Roubaix Cedex 1, France International Exchange Programmes Fact Sheet 2014 2015 Lille

More information

7 semesters or 7x30 = 210 ECTS

7 semesters or 7x30 = 210 ECTS General description of the degree program Name Qualification awarded: Level of qualification Qualification requirements and regulations Key learning outcomes Profile of the program Occupational profiles

More information

Université de Nice. Each Faculté will have a different website and courses will be located in different places.

Université de Nice. Each Faculté will have a different website and courses will be located in different places. Université de Nice 1. Go to the home page of the university: http://unice.fr/ 2. If there is an option to set a language, click on the French flag. If you find that some of the pages do not work, make

More information

Online Masters Programme in Computer Science Study anytime, anywhere. School of Computer Science

Online Masters Programme in Computer Science Study anytime, anywhere. School of Computer Science Online Masters Programme in Computer Science Study anytime, anywhere School of Computer Science What is online study? Our innovative online programme enables you to study for a masters degree (MSc) without

More information

COURSE WEBSITE: http://leonardo.sfasu.edu/jjohnston *This is essential for success in this class.

COURSE WEBSITE: http://leonardo.sfasu.edu/jjohnston *This is essential for success in this class. French 132 Beginning French II FRE 132.001 Dr. Joyce Johnston Email: jjohnston@sfasu.edu Phone: X2279 Office: LAN 252 Office Hours: MW 8-9am,12-1pm and 2:15-2:45pm Th 1-3:30 F 8-9am and 1-2:45pm *or by

More information

ReSIST NoE Resilience for Survivability in IST

ReSIST NoE Resilience for Survivability in IST MSc Curriculum in Resilient Computing Courseware availability Luca Simoncini University of Pisa, Italy Curriculum rationale To move from the usual application-driven MSc curricola (like MSc in embedded

More information

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

11557 - CRIPT - Cryptography and Network Security

11557 - CRIPT - Cryptography and Network Security Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S

More information

TELECOMMUNICATION NETWORKS

TELECOMMUNICATION NETWORKS THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS

More information

the degree program Electrical Engineering Power Engineering and Bachelor of Engineering (B.Eng.)

the degree program Electrical Engineering Power Engineering and Bachelor of Engineering (B.Eng.) General description of the degree program Name of the degree program: Degree awarded: Electrical Engineering Power Engineering and Renewable Energy Bachelor of Engineering (B.Eng.) Educational and professional

More information

Master of Science in Computer Science Degree Requirements, Policies, and Procedures

Master of Science in Computer Science Degree Requirements, Policies, and Procedures Master of Science in Computer Science Degree Requirements, Policies, and Procedures Summary of Procedures for M.S. Students Complete every deficiency course with a B or higher within the first two terms

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg 1 The MSc program in computer science Worldwide, computer scientists are in high demand. To cater for this demand,

More information

Bachelor of Applied Information Science (Information Systems Security)

Bachelor of Applied Information Science (Information Systems Security) Sheridan College Institute of Technology and Advanced Learning Bachelor of Applied Information Science (Information Systems Security) Victor Ralevich, Ph.D. Professor and Program Coordinator Sheridan College

More information

MSc Programme Intelligent Adaptive Systems (IAS)

MSc Programme Intelligent Adaptive Systems (IAS) Faculty of Mathematics, Informatics and Natural Sciences Department of Informatics UHH Fachbereich Informatik Vogt-Koelln-Str. 30 D-22527 Hamburg MSc Programme Intelligent Adaptive Systems (IAS) Web: http://www.master-intelligent-adaptive-systems.com/

More information

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September

More information

Monitoring Students Performances in French Institutes of Technology using the ScoDoc Software

Monitoring Students Performances in French Institutes of Technology using the ScoDoc Software http://www-lipn.univ-paris3.fr/ petrucci/papers In Proc. of the 3th International Conference on Information Technology Based Higher Education and Training (ITHET 4), York, UK, IEEE Computer Society Press,

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

Department of Computer Science

Department of Computer Science Department of Computer Science Unless indicated to the contrary the Period of Registration, Entry Requirements, Curriculum, Assessment and Qualifications for Programmes are as follows: Period of Registration:

More information

Packet Level Authentication Overview

Packet Level Authentication Overview Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction

More information

Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?

Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? World Standards Day 2015 ILNAS 2015-10-14 Cédric Mauny, Vice-Chairman of Luxembourg National Committee ISO/IEC JTC1

More information

MASTER S DEGREE IN ENGINEERING

MASTER S DEGREE IN ENGINEERING The combines many different positions for engineers. Our graduates might decide to work as network access architects, radio support engineers, network deployment project managers, marketing managers for

More information

Web-based Modules for Cyberphysical Systems Security

Web-based Modules for Cyberphysical Systems Security Web-based Modules for Cyberphysical Systems Security Janusz Zalewski, Florida Gulf Coast University Nary Subramanian, University of Texas at Tyler Andew Kornecki, Embry-Riddle Aeronautical University Bogdan

More information

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations. Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Master s Degree in INTERNATIONAL MARKETING & SALES MANAGEMENT Official Master s Degree European Higher Education Area

Master s Degree in INTERNATIONAL MARKETING & SALES MANAGEMENT Official Master s Degree European Higher Education Area Master s Degree in INTERNATIONAL MARKETING & SALES MANAGEMENT Official Master s Degree European Higher Education Area 2 Why study at IQS? IQS is a Higher Education Center founded by the Society of Jesus,

More information

The University Board of the Bern University of Applied Sciences,

The University Board of the Bern University of Applied Sciences, Study and examination regulations for the Master of Science in Engineering in the departments Architecture, Wood and Civil Engineering and Engineering Science and Information Technology (CER MSE) The University

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Programme Specification

Programme Specification LOUGHBOROUGH UNIVERSITY Programme Specification Information Technology & Physics Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes

More information

Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS

Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS MSc Env Printemps semaine 1 (8) Heures Lundi 22.02.3016 Mardi 23.02.2016 Mercredi 24.02.2016 Jeudi 25.02.2016 Vendredi 26.02.2016 MSc Env Printemps semaine 2 (9) Heures Lundi 29.02.2016 Mardi 01.03.2016

More information

Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)

Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM) Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM) Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator Master s team Nicolas Mayer

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other

More information

MIB Application Guide

MIB Application Guide MIB Application Guide The dead line of the application is on the 24 th April 2013. The requested documents for the application are : Curriculum vitae All your diploma since the baccalauréat or equivalent

More information

World Summit on Information Society (WSIS) Forum 2013. 16 May 2013

World Summit on Information Society (WSIS) Forum 2013. 16 May 2013 World Summit on Information Society (WSIS) Forum 2013 Toolkit for creating ICT-based services using mobile communications for e- government services 16 May 2013 Hani Eskandar ICT Applications coordinator

More information

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240 PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,

More information

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner wagnerpj@uwec.edu Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy

More information

M.Sc. Computer Science Information about the degree programme

M.Sc. Computer Science Information about the degree programme Academic Advice Service Faculty of Computer Science and Mathematics M.Sc. Computer Science Information about the degree programme For more information, visit www.uni-passau.de/en/msc-computer-science/

More information

Administration Marianne HOYEZ-GENET 03.80.39.54 20 marianne.hoyez-genet@u-bourgogne.fr

Administration Marianne HOYEZ-GENET 03.80.39.54 20 marianne.hoyez-genet@u-bourgogne.fr Niveau : Domaine : Mention : Spécialité : DROIT-ECONOMIE-GESTION SCIENCES DU MANAGEMENT (Management Sciences) IMBS International Master in Business Studies (Administration des Enterprises) Volume horaire

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Unit 14: Principles of ICT Systems and Data Security Unit code: L/601/3508 QCF Level 2: BTEC Specialist Credit value: 6 Guided learning hours: 45 Aim and purpose This unit introduces the common types of

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

Durée 4 jours. Pré-requis

Durée 4 jours. Pré-requis F5 - BIG-IP Application Security Manager V11.0 Présentation du cours Ce cours traite des attaques applicatives orientées Web et de la façon d utiliser Application Security Manager (ASM) pour s en protéger.

More information

LOUGHBOROUGH UNIVERSITY

LOUGHBOROUGH UNIVERSITY LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

More information

Faculty of Arts. 5. Registration for course units and study progress supervision

Faculty of Arts. 5. Registration for course units and study progress supervision Faculty of Arts Teaching and Examination Regulations 2014-2015 Research Master s degree programmes in History (CROHO 60139) and International Relations (CROHO 60820) Specialization Modern History and International

More information

Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement

Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement PROGRAMME SPECIFICATION KEY FACTS Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement Award BSc (Hons) School School of Mathematics, Computer

More information

Diploma of Advanced Studies / REALisation - Ceramic & Polymers

Diploma of Advanced Studies / REALisation - Ceramic & Polymers Diploma of Advanced Studies / REALisation - Ceramic & Polymers Luka Maurer, Researchs Workshop Wieki Somers & Chris Kabel / Photography Sandra Pointet REAL postgraduate studies CERCCO is the Centre for

More information

International Journal for Research in Computer Science

International Journal for Research in Computer Science TOPIC: MOBILE COMPUTING AND SECURITY ISSUES. ABSTRACT Owodele Odukale The past decade has seen a growth in the use of mobile computing. Its use can be found in areas such as social media, information exchange,

More information

Mathematics, Computer Science and Engineering Department or equivalent Computer Science

Mathematics, Computer Science and Engineering Department or equivalent Computer Science PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Health Informatics Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Computer Science

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

CULTURAL POLICY AND MANAGEMENT

CULTURAL POLICY AND MANAGEMENT and Master Programme in CULTURAL POLICY AND MANAGEMENT (Interculturalism and Mediation in the Balkans) MA IN CULTURAL POLICY AND MANAGEMENT Study Level: Master Study Mode: Full Time Duration: One academic

More information

Bachelor of Engineering (B.Eng.)

Bachelor of Engineering (B.Eng.) General description of degree program Name of degree program: Degree awarded: Specialization: Educational and professional goals: Program duration: Pre-study work experience: Conditions of admission: Traineeship

More information

School of Informatics Department or equivalent Department of Computer Science Programme code

School of Informatics Department or equivalent Department of Computer Science Programme code PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name E-Business Systems Award MSc School School of Informatics Department or equivalent Department of Computer Science Programme code

More information

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information