This shows you the differences between two versions of the page.
courses:is2012:main [2012/09/30 13:35] tsay |
courses:is2012:main [2022/12/09 11:11] (current) tsay2 [Announcements] |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== Announcements ===== | ===== Announcements ===== | ||
+ | * 01/21: Grade Report available (revised 01/22). | ||
+ | * 12/24: reminder: for 12/25, the class meets in Room 106 of 台大計資中心. | ||
+ | * 12/04: project descriptions: {{courses:is2012:termproject_tsay.pdf|Prof. Tsay}}, {{courses:is2012:termproject_lin.pdf|Prof. Lin}}, {{courses:is2012:termproject_lee.pdf|Prof. Lee}}, and [[courses:is2012:termproject_sun|Prof. Sun]]. | ||
+ | * 12/04: {{courses:is2012:termproject.pdf|Term Project}} announced; proposal due on Dec. 25. | ||
+ | * 11/13: slides for Cryptographic Hash Functions, Message Authentication, and Digital Signatures available. | ||
+ | * 11/03: {{courses:is2012:hw2.pdf|HW#2}} due on 11/13. | ||
+ | * 11/03: slides for Public-Key Cryptography and for Key Management and User Authentication available. | ||
+ | * 11/02: suggested solutions for {{courses:is2012:hw1a_s.pdf|HW#1A}} and {{courses:is2012:hw1b_s.pdf|HW#1B}} available. | ||
+ | * 10/09: {{courses:is2012:hw1b.pdf|HW#1B}} due on 10/16. | ||
+ | * 10/02: slides for Multiple Ciphers and Modes of Operation and for Random Number Generation and Stream Ciphers available | ||
* 09/25: {{courses:is2012:hw1a.pdf|HW#1A}} due on <del>10/02</del> (extended to 10/09). | * 09/25: {{courses:is2012:hw1a.pdf|HW#1A}} due on <del>10/02</del> (extended to 10/09). | ||
* 09/25: slides for AES available. | * 09/25: slides for AES available. | ||
Line 47: | Line 57: | ||
* Key Management and User Authentication (1 week: 10/30) [{{courses:is2012:Mutual_Trust.ppt|slides}}] | * Key Management and User Authentication (1 week: 10/30) [{{courses:is2012:Mutual_Trust.ppt|slides}}] | ||
* Midterm (2012/11/06) | * Midterm (2012/11/06) | ||
- | * Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/13, 11/20, 11/27) [slides: {{courses:is2012:ch11.ppt|Cryptographic Hash Functions}}, {{courses:is2012:ch12.ppt|Message Authentication}}, {{courses:is2012:ch13.ppt|Digital Signatures}}] | + | * Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/13, 11/20, 11/27) [slides: {{courses:is2012:ch11.pptx|Cryptographic Hash Functions}}, {{courses:is2012:ch12.pptx|Message Authentication}}, {{courses:is2012:ch13.pptx|Digital Signatures}}] |
- | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, rewalls, denial of service, etc. (3 weeks: 12/04, 12/11, 12/18) [ [[http://www.im.ntu.edu.tw/~sunny/courses_teaching.html|slides]] ] | + | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (3 weeks: 12/04, 12/11, 12/18) [ [[http://www.im.ntu.edu.tw/~sunny/courses_teaching.html|slides]] ] |
* Field Trip (2012/12/25) [{{courses:is2012:field_trip.pdf|schedule}}] | * Field Trip (2012/12/25) [{{courses:is2012:field_trip.pdf|schedule}}] | ||
* Final (2013/01/08) | * Final (2013/01/08) | ||
Line 80: | Line 90: | ||
[Midterm 2008: {{courses:is:mid2008I.pdf|Part I}}] \\ | [Midterm 2008: {{courses:is:mid2008I.pdf|Part I}}] \\ | ||
[Midterm 2009: {{courses:is:mid2009I.pdf|Part I}}] \\ | [Midterm 2009: {{courses:is:mid2009I.pdf|Part I}}] \\ | ||
- | [Midterm 2010: {{courses:is:mid2010I.pdf|Part I}}] \\ | + | [Midterm 2010: {{courses:is:mid2010I.pdf|Part I}}, {{courses:is:mid2010II.pdf|Part II}}] \\ |
[Midterm 2011: {{courses:is:mid2011I.pdf|Part I}}] | [Midterm 2011: {{courses:is:mid2011I.pdf|Part I}}] |