COE 551
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
CATALOG DESCRIPTION
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Course ObjectivesInformation security and cryptography provides the gateways through which electronic commerce will flow in the future Internet. Most technologies that shape tomorrow's society will be built around these gateways. These gateways will allow mass customization of information to individual and corporate consumers by letting people turn their driver's licenses into digital wallets that carry anything from electronic cash to credit lines, airline tickets, or medical prescriptions. Information security technology provides the necessary tools and methods for the construction of this infrastructure in such a way that the privacy, ownership rights, and consumer rights of the participants are protected. We will study theoretical aspects of cryptographic algorithms and security protocols, and show how these techniques can be applied to solve particular data storage, networking, communication security, rights management problems. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning outcome
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Selected References
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Grading Policy
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Plagiarism, copying and other anti-intellectual behavior are prohibited by the university regulations. Violators may have to face serious consequences. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Topics |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
|