ece 7970 advanced cryptography applications in emerging
play

ECE 7970 Advanced Cryptography Applications in Emerging Wireless - PowerPoint PPT Presentation

ECE 7970 Advanced Cryptography Applications in Emerging Wireless Networks Chapter 0: Important information Dr. Mohamed Mahmoud http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu 1 - Course I nform ation I nstructor : Dr. Mohamed M. E.


  1. ECE 7970 – Advanced Cryptography Applications in Emerging Wireless Networks Chapter 0: Important information Dr. Mohamed Mahmoud http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu

  2. 1 - Course I nform ation I nstructor : Dr. Mohamed M. E. A. Mahmoud Office: Brown Hall - 331 lab: Brown Hall - 324 E-mail: mmahmoud@tntech.edu Homepage: http: / / www.cae.tntech.edu/ ~ mmahmoud/ Lectures : Mondays and Wednesdays, 12: 20 to 1: 40 in Brwn 208 Office hours: MW 11: 20 to 12: 20. Do not hesitate to contact m e if you have any question or problem 0 - 1

  3. 2 - Feedback I strongly welcome feedback on how to improve teaching this course. Feel free to talk to me or email me. 0 - 2

  4. 3 - Course Description Prerequisites: 1. Knowledge of security concepts and basic cryptography primitives. 2. Knowledge of high level programming language (C). 3. Knowledge of network concepts. 1 and 2 were covered in ECE 6900: Security and privacy preservation for wireless networks. 0 - 3

  5. Course Description: - Advanced topics in the design of security and privacy protocols for the emerging wireless networks. - Using advanced cryptography techniques to solve new security/privacy problems raised in the emerging wireless networks. - To address the research streams in the security/privacy of the emerging wireless networks’ applications. Course Topics: 1. Review to basic concepts in wireless networks. 2. Review to basic security concepts and cryptography primitives. 3. Emerging applications for wireless networks. 4. Security and privacy challenges in emerging wireless networks’ applications. 5. Advanced security schemes for the emerging wireless networks. 6. Advanced privacy-preserving schemes for the emerging wireless networks. 0 - 4

  6. Novel cryptography algorithms Security/privacy threats in (tools to achieve security/privacy) emerging wireless networks Solutions Problems 0 - 5

  7. Course Textbook - No textbook is required. - The lecture materials will be derived from a number of background papers and textbooks. - Various reading material and research papers will be given. 0 - 6

  8. Course Evaluation 1 - Assignm ents, reports, and presentations: 5 0 % of the final grade. To be done individually. 2 - Project: literature survey report. To be done individually. 2 0 % of the final grade. 3 - Tests : 1 0 % of the final grade. OPEN book, notes, laptops, etc. 4 - Final exam : The final examination will count for 2 0 % of the final grade. OPEN book, notes, laptops, etc. 0 - 7

  9. Expectations - The literature survey and the reports are 7 0 % of the final grade but that does not m ean you w ill get m ost of this grade even if you do poor w ork. W rong assum ption - When I ask for a survey or a report, it has to be well done. - Do not assume that you will pass without enough work because I’m your advisor. W rong assum ption - For the survey and the presentation, you will need several meetings with me to get guidance. - Class participation: Your input is needed for good discussion - Fully understand the slides, lectures, and assignments - Be on time (if you are late enter the class quiet) 0 - 8

  10. Expectations - Focus in classes and take good notes - Get help early if you need. It is your responsibility to seek help from the instructor. - Begin studying the material the same day it is presented – do not accumulate lectures – the number of slides may be large – each lecture builds on the previous ones. 0 - 9

  11. - Slides are protected by a password. - You do not need to type the password every time you open the files. - You can cancel the password protection after you download and open the files as follows 0 - 10

  12. 0 - 11

  13. Questions Mohamed Mahmoud

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend