Código: | CC557 | Sigla: | CIS |
Áreas Científicas | |
---|---|
Classificação | Área Científica |
OFICIAL | Informática |
Ativa? | Sim |
Unidade Responsável: | Departamento de Ciência de Computadores |
Curso/CE Responsável: | Programa Doutoral em Informática |
Sigla | Nº de Estudantes | Plano de Estudos | Anos Curriculares | Créditos UCN | Créditos ECTS | Horas de Contacto | Horas Totais |
---|---|---|---|---|---|---|---|
PDMAPI | 6 | PE Oficial do Programa Doutoral em Informática | 1 | - | 5 | 49 | 135 |
PE Oficial do Programa Doutoral em Informática a partir de 2016/17 | 1 | - | 5 | 49 | 135 |
The objective of this course is to expose students to cutting-edge research topics in relevant areas in information security, namely cryptography and systems’ and network security.
It is not intended as an introductory survey in any of these areas. Instead, the focus will be on advanced topics and recent results. The course will emphasise definitions, foundations, and a formal approach to information security. The course is at a similar level and covers overlapping material with the following advanced modules taught at leading academic institutions in the information security area, namely:
Familiarity with scientific challenges in information security.
– One-way functions, commitment schemes, one-way permutations, hard-core bits, and pseudorandomness.
– Public-key encryption: security definitions, hybrid encryption, example schemes.
– Zero Knowledge, Non-Interactive Zero-Knowledge and its use in achieving chosen ciphertext security.
– Public-key signatures: security definitions, one-time signatures, examples schemes.
– Introduction to Networking, Network Security and Secure Protocols.
– Public key certification.
– Secure Protocols: IPSec, SSL/TLS and SSH.
– Network security architectures: 802.11i.
– Security policies; security models; mandatory and discretionary access control; access control matrix, capabilities and access control lists.
– User authentication: passwords, biometrics and user tokens; identity management.
– Introduction to Smart Cards; Assets for Cyber Security.
– Smart Cards in eIDs/Passports
– Privacy by Design
– Anonimization Techniques
– Data protection legislation
Designação | Peso (%) |
---|---|
Apresentação/discussão de um trabalho científico | 25,00 |
Exame | 25,00 |
Trabalho escrito | 25,00 |
Trabalho prático ou de projeto | 25,00 |
Total: | 100,00 |
The evaluation is divided in four equal parts, each corresponding to each of the four main content parts. The evaluation may include a writen exam, a project, or a written assignment and a presentation.