[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Crypto continues to go mainstream



>From: [email protected] (Lance J. Hoffman)
>Newsgroups: sci.crypt,alt.security,comp.security.misc,alt.security.pgp
>Subject: Re: University courses on cryptography and security
>Date: 4 Dec 1996 22:17:20 -0500
>Organization: George Washington University
>Message-ID: <[email protected]>
>References: <[email protected]>
>
>The George Washington University
>GRADUATE DEGREE IN COMPUTER SCIENCE
>Specialization in Computer Security
>
>     The George Washington University Department of Electrical
>Engineering and Computer Science
>offers a traditional graduate program with a few twists.  One of the
>twists is that we now have four
>graduate courses related to computer security, and an area of
>specialization (within computer science) in
>it.  In addition, the opportunities to pursue dissertation work and
>special projects are "real world" since
>many government administrative agencies, laboratories, and Congress
>are usually just a metro ride away.
>=46or those who wish to combine technology and public policy, excellent
>contacts are maintained with the
>law and medical schools and with key congressional and administration
>offices.
>
>DESCRIPTIONS OF COMPUTER SECURITY RELATED COURSES
>
>CS 229. Computer Security Systems I.  Techniques for security in
>computer systems.  Authentication,
>logging, authorization, encryption.  International criteria.ia s.
>Effects of operating systems and
>machine architecture, countermeasures, risk-analysis systems.
>Companion course to EE 250.
>Prerequisite: CSci 144 (Concepts of Programming Languages) or
>equivalent.
>
>CS 329. Computer Security Systems II.  Advanced topics in information
>system security.  Intrusion detection.  Viruses, worms, and trojan
>horses, and other rogue programs.  Advanced risk analysis methodologies,
>developing international standards, computer security models.  Network
>security.  Protection against statistical inference.  Prerequisite CS229.
>B
>s
>EE250. Telecommunications Security Systems.  Cryptography.  Speech
>and data scrambling.  Nonlinear
>transformations.  Block and stream ciphers.  DES algorithm and public
>key cryptography.  Key
>management, digital signatures, and authentication.  Data
>communication security protocols.  Secure voice
>communications.  The CLIPPER initiative and escrowed-key schemes.
>Companion course to CS 229.
>Prerequisite EE 204 (Stochastic signals and noise) or equivalent.
>
>CS 230. Information Policy.  Issues related to computers and privacy,
>equity, freedom of speech, search
>and seizure, access to personal and governmental information,
>professional responsibilities, ethics,
>criminality, and law enforcement.  This course examines these policy
>issues using the current literature
>and written, electronic, and videotape proceedings of recent major
>conferences and government hearings.
>Prerequiste CS 131 (Programming and Data Structures) or equivalent.
>
>                     FOR FURTHER INFORMATION
>
>Administrative: Contact the Department of Electrical Engineering and
>Computer Science, (202) 994-6083.
>About courses: Contact Prof. Lance J. Hoffman, (202) 994-4955 or
>[email protected].
>
>
>
>December 4, 1996
>--
>Professor Lance J. Hoffman
>Department of Electrical Engineering and Computer Science
>The George Washington University    (202) 994-4955    Fax: (202) 994-0227
>Washington, D. C. 20052             [email protected]
>
>--
>Professor Lance J. Hoffman
>Dept of Elec Eng and Comp Sci, The Geo Washington U, 801 22nd St NW
>Wash DC 20052   (202) 994-5513   Fax: (202) 994-0227  =
>[email protected]
>See also info on the Cyberspace Policy Institute:
>http://www.cpi.seas.gwu.edu/