Computer Science
Department
Virginia Polytechnic Institute and State University
Time: | Wed 4:00 pm - 6:45 pm |
Location: | 325 Northern Virginia Center |
Instructor: | Dr. Wenjing Lou (wjlou@vt.edu) |
Office: | 304 Northern Virginia Center |
Phone: | (703) 538-3774 |
Office Hours: | Thursdays 2-4pm or by appointment |
Prerequisites: | Students are expected to have some working knowledge of computers, basic computer networks, basic wireless networks, and basic operating systems. |
Text book: | There is no required text book for this course. The instructor will select the research papers to be introduced in the course and make them available to the students. |
Reference book: | Applied Cryptography, by
Bruce Schneier Handbook of Applied Cryptography, by Menezes, van Oorschot, and Vanstone (Free online version is available) Cryptography and Network Security: Principles and Practice, by William Stallings Network Security: Private Communication in a Public World, by Charlie Kaufman, Radia Perlman, Mike Speciner RSA's Crypto FAQ: Frequently Asked Questions about Today's Cryptography, Version 4.1 (available online) |
This course focuses on selected research topics of current interest in wireless security and is intended for Master or Doctoral students who are interested in wireless security research. At the end of this course, students will have a broad knowledge of the state-of-the-art and open problems in wireless security, thus enhancing their potential to do research or pursue a career in this rapidly developing area. This course is structured as a research seminar where research papers from leading conferences & journals will be presented by students or the instructor.
Topics that may be covered in this course (but not limited to):
Your grades will be determined as follows:
Class attendance | 10% | |
Discussion participation | 10% | |
Homework | 20% | |
Presentation | 30% | |
Term paper | 30% | |
Bonus Project | 10% |
Class attendance is expected in every class. Failing to attend one class without the instructor's consent costs 1 point of the final grade in 100 scale.
Students are encouraged to actively participate in the class discussion of research papers.
Typically 2~3 research papers will be assigned for each class. Students are required to read the assigned paper before coming to the class and be able to competently discuss the material in class. In addition, each student should submit a one-page (letter-sized) summary for one of the assigned papers, which should contain a one-paragraph description of the paper and descriptions of three strong points plus three weak points you discovered in the paper. Paper summaries should be single-column, 1 inch margins, 11-point size, single-spaced, and written using text editors such as MS Word and Latex. Paper summaries are due one hour before the class starts and should be submitted to the instructor by email in PDF or DOC formats with [CS6204: HW#] in the subject line.
Students will form two-person teams. Each week a two-person team is required to present and lead the discussion of the two papers assigned for the week. The presentation of each paper takes 35 minutes of class time and is followed by 15 minutes for question and answer. To present a paper, the two students must thoroughly study the papers together, read the references if necessary, prepare the slides, coordinate the presentation, and practice the talk before the class if necessary. The students should spend about a week in preparing each presentation and must be able to lead an active discussion as well as answering the questions to the papers raised by the audience. The students should also email the instructor the presentation slides (MS PowerPoint) before 12:00pm of their presentation day. The presentation is evaluated based on the following criteria.
Virginia Tech has an established academic honor code, described in graduate
honor systems. Please review the code and be aware that I expect students to
abide fully by this code.
The instructor would like to thank Professor Yanchao Zhang at ASU and Prof. Peng Ning at NCSU. Some of the content and structure of this course has referred to their earlier offering of similar courses.