Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Data Protection and Security I
Date
2010
Author
Bıçakçı, Kemal
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
310
views
0
downloads
Cite This
This course allows you to understand the basics of data security and protection, computer security and encryption. Various encryption and attack techniques are discussed. Common security problems and vulnerabilities are outlined. By the end of this course, the student will be able to: 1.1 Define the term security and main security concepts. 1.2 List common information security targets. 1.3 Describe what security management means. 1.4 Explain general security principles. 2.1 Define cryptography and understand its role in information security. 2.2 List the most important developments in the history of cryptography. 2.3 Explain how simple ciphers work. 2.4 Explain how one-time pad can realize perfect secrecy. 3.1 Explain the operation of symmetric encryption algorithms DES and AES. 3.2 Describe the properties and applications of hash functions. 3.3 Explain message authentication codes and their purposes. 3.4 Understand the importance of random number generators. 4.1 Construct a public-key encryption scheme. 4.2 Understand two mathematical problems most public-key schemes depend on. 4.3.Describe the operation of digital signatures. 4.4 Realize the problem solving capability of public key cryptography with an example of secret sharing scheme.
URI
https://ocw.metu.edu.tr/course/view.php?id=92
https://hdl.handle.net/11511/37033
Collections
Graduate School of Informatics, Course Material
Suggestions
OpenMETU
Core
Data Protection and Security II
Bıçakçı, Kemal(2010)
This course allows you to understand the basics of Access Control Mechanisms, Operating System Security and Secure Programming, Identification and Entity Authentication, Standards and Protocols. The materials are also supported with several animations, videos and various references. By the end of this section, the student will be able to: 5.1 Understand access control of operating systems 5.2 Describe security principles of role based access control 5.3 Explain multilevel security models 5.4 Describe Formal...
Distributed Content Based Video Identification in Peer-to-Peer Networks: Requirements and Solutions
Koz, Alper; Lagendijk, R. (Inald) L. (2017-03-01)
In this paper, we first discuss the essential requirements for a fingerprint (perceptual hash)-based distributed video identification system in peer-to-peer (P2P) networks in comparison with traditional central database implementations of fingerprints. This discussion reveals that first, fingerprint sizes of existing video fingerprint methods are not compatible with the cache sizes of current P2P clients; second, fingerprint extraction durations during a query are not at tolerable levels for a user in the n...
Intelligent student assessment and coaching interface to web-based education-oriented intelligent experimentation on robot supported laboratory set-ups
Motuk, Halil Erdem; Erkmen, Aydan Müşerref; Erkmen, İsmet; Department of Electrical and Electronics Engineering (2003)
This thesis presents a framework for an intelligent interface for the access of robotsupported remote laboratories through the Internet. The framework is composed of the student assessment and coaching system, the experimentation scenario, and the associated graphical user interface. Student assessment and coaching system is the main feature of a successful intelligent interface for use during remote experimentation with a robot-supported laboratory setup. The system has a modular structure employing artifi...
Identity/attribute-based authentication protocols based on pairings
Öztürk, Gülnihal; Doğanaksoy, Ali; Department of Cryptography (2020-10-22)
Authentication is one of the most important goals in cryptography. It provides sharing information with only authorized people and protecting data from being modified. Authentication can be achieved in various ways such as password-based, symmetric-key and public-key. The public-key authentication is the most preferred one among these options. It provides construction of key pairs and verification with based on hard mathematical problems. Public-key authentication is used as a basis for two important ideas:...
Increasing trustworthiness of security critical applications using trusted computing
Uzunay, Yusuf; Baykal, Nazife; Bıçakcı, Kemal; Department of Information Systems (2014)
In this thesis work, we aim to increase the trustworthiness of security critical applications by utilizing trusted computing technologies. We focus on two case applications; authentication proxy systems and e-voting systems. Our first case application is authentication proxy systems which store users’ sensitive credentials and submit them to the servers of the service providers on their behalf. To increase the trustworthiness of authentication proxy systems, we propose Trust-in-the-Middle a trusted platform...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
K. Bıçakçı, “Data Protection and Security I,” 00, 2010, Accessed: 00, 2020. [Online]. Available: https://ocw.metu.edu.tr/course/view.php?id=92.