![]() |
![]() |
||||
![]() |
![]() |
UPM / IMDEA Track in Software Development through Rigorous MethodsTable of ContentsReading group on computer security ICoordinator(s)/Instructor(s)
Length3 credits (ECTS) (bi-weekly meeting) PrerequisitesKnowledge on the basic principles of computer security. An undergraduate level course on computer security is desired but not required. This course has specific requirements, and if your initial level is not adequate, you may not pass. Therefore, we ask you to please include it in the mail you ought to send to graduate.school (at) software.imdea.org with the list of courses you want to take from the IMDEA track. You will receive a mail stating the courses in which you are welcome to enroll. If you enroll in an IMDEA Track course for which you did not receive explicit approval, you may be asked to switch over to a different one. Course web page (if any)Summary and objectivesThis course will focus on reading and presentation of research papers in the area of computer security. The research paper will encompass both foundational papers, i.e., those that laid the basis for current security techniques and defenses, as well as research papers on contemporary computer security research topics. The papers will encompass the sub-areas of applied cryptography, systems security, and software security. Students taking this course will:
TopicsWill be selected based on latest research topics, as well as the background of the students. EvaluationEvaluation will be based on the student's ability to perform critical reading, the paper presentations, and the student's overall involvement in the course. Recommended readingWill be decided based on the selected topics.
Back to the initial page |
|||
![]() |
|||||
Fractals are used with permission from their author Cory Ench
| © 2006-2007.
IMDEA Software. All rights reserved | Legal Notice | Privacy Policy |