Information Security Prof. David Zhang Department of Computing Hong Kong Polytechnic University Tel: 2766-7271 PQ809

Slides:



Advertisements
Similar presentations
Course Outline Presentation Term: F09 Faculty Name : Asma Sanam Larik Course Name :INTRO TO COMPUTING Course Code : CSE145 Section :1 Semester : 1.
Advertisements

VP Publications’ Report Vincenzo Piuri 2011 AdCom Meeting Montreal, Canada – 7 April 2011.
ForSe Overview Forensics and Security Laboratory (ForSe Lab) School of Computer Engineering Nanyang Technological University.
ICT AND THE ISLAMIC PERSPECTIVE
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
INTELLIGENT CONTROL SYSTEMS Day 1/1
CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Overview Slide 1 EE3900 Computer Networks.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
Toshihide Ibaraki  October 1985, Professor, Kyoto University  April 2001-March 2003, Dean, Graduate School of Informatics, Kyoto University  April 2004,
Azriel Rosenfeld Prepared by Ben Shneiderman. Azriel Rosenfeld ( )
Digital Image Processing & Pattern Analysis (CSCE 563) Course Outline & Introduction Prof. Amr Goneid Department of Computer Science & Engineering The.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Foundations of Software Testing
Computer Communications & Networks COMSATS Islamabad Course Introduction Qaisar Javaid, Assistant Professor CIIT.
CEN 592 PATTERN RECOGNITION Spring Term CEN 592 PATTERN RECOGNITION Spring Term DEPARTMENT of INFORMATION TECHNOLOGIES Assoc. Prof.
COMP 4332 / RMBI 4330 Big Data Mining (Spring 2015) Lei Chen Hong Kong University of Science and Technology
Intelligent Control Applied to Motor Drives Reference: 1. Selected technical papers. 2. Modern Power Electronics and AC Drives, B. K. Bose, Prentice Hall,
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Applied Security Breno de Medeiros Florida State University Fall 2005.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
TMK 264: COMPUTER SECURITY OVERVIEW. No SUBJECT DETAIL 1.Subject NameComputer Security 2.CodeTMK StatusCore 4.Credit Hour3 5.SemesterSemester 4,
Eberhard O. Voit  Professor and Georgia Research Alliance Eminent Scholar in Systems Biology, The Wallace H. Coulter Department of Biomedical Engineering.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Remote Sensing GEO483/553, Fall 2013 Tu Th 2:00-3:20pm, 322 Fillmore.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
Department of Electronic Engineering City University of Hong Kong EE3010 Data Communications and LANs Overview Slide 1 EE3010 Data Communications and LANs.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
1 Data Mining Education Across Disciplines Dr. Alan Safer and Dr. Lesley Farmer California State University Long Beach /
Distinguished Talk Dr. Jun Wang, IEEE Fellow Professor Dept. of Mechanical and Automation Engineering, The Chinese University of Hong Kong For further.
LI Aijun. Introduce yourself   Where you from   Major   supervisor.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
CAD Computer Aided Design Doru Todinca Course web page: in Teaching,
CCM 4300 Lecture 1 Computer Networks: Wireless and Mobile Communication Systems Dr E. Ever School of Engineering and Information Sciences CCM4300_Autumn.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
2016/2/4Course Introduction1 COMP 4332, RMBI 4330 Advanced Data Mining (Spring 2012) Qiang Yang Hong Kong University of Science and Technology
Advanced Topics in Computer Networks (Fall 2005) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
Sensor Networks (Spring 2004) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
SOFTC : Honors and Awards Mike Rahmatipour, Chair, Awards Subcommittee 03/12/2011.
Embedded and Real Time Systems David Andrews
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Chuck Frank Northern Kentucky University
Sensor Calibration and Characteristics
Introduction to Information Security
Introduction to Information Security
Syed Sohail Ahmed Assistant Professor, UET Taxila
INFORMATION TECHNOLOGY UNIVERSITY OFFICE OF EXCELLENT PROGRAMS
Biometrics Authentication
Thoughts on IEEE My Vision as President
Chuck Frank Northern Kentucky University
ECEN “Internet Protocols and Modeling”
CNT 4704 Analysis of Computer Communication Networks
Introduction to Computer Security II
CIAO Research Forum Citations don’t measure the quality of research?
Jiangbin Zheng’s Brief Biography
Fundamental of Artificial Intelligence (CSC3180)
Dept. of Computer Science University of Liverpool
The Computer as a Medium for Sharing Knowledge
Balani/iGroup Infotech India Pvt. Ltd.
Fundamental of Multimedia System (CSC3185)
CAD Computer Aided Design
CSCI284 Spring 2004 GWU Introduction CSCI284 Spring 2004 GWU
Presentation transcript:

Information Security Prof. David Zhang Department of Computing Hong Kong Polytechnic University Tel: PQ809

Lecturer  Academic Position Chair Professor: Chair Professor: Since 2005 in COMP Founding Lecturer Founding Lecturer (COMP5525): ~10 years  Professional Honors IEEE Fellow/ IAPR Fellow Selected as a Highly Cited Researchers in Engineering by Thomson Reuters in 2014 and in 2015, respectively. (  Research Interests Biometrics, Information Security, Image Processing & Pattern Recognition  Publication >350 International Journal Papers, ~15 Books and >35 Patents from USA/HK/Japan/China

Teaching Method l Management Lectures: 18:30-20:30 Wednesday BC309 Tutorials: 20:30-21:30 Wednesday BC309 TA: Jingxing Li l Assessment Assignment 45% Exam 55% l Two Parts –Network security –Network security: Technologies & applications –Biometrics security –Biometrics security: Technologies & system

Network Security l Aim: Understand the basic technologies – cryptograph and various applications l Main topics l Conventional encryption –Classical technologies –Modern technologies l Public-key cryptograph l Message authentication l Watermarking by internet

Biometrics Security l Aim: Introduce biometrics computing knowledge and methods for security l Main topics l Best privacy tool: Biometrics l Privacy biometrics technologies l Typical physical biometrics l Typical behavioural biometrics l Biometric Security applications

Background Knowledge Except Internet and Computer System, the main background is needed as follows: l Number Theory l Prime numbers l Modular arithmetic l Number theorems l Pattern Recognition & Image Processing l One- and two- dimension signal/image processing l Feature extraction, classification and matching l Statistics pattern recognition

Assignment l Case Study: –Network & System Security l Electronic mail security l IP security and Web security l Intruders and viruses l Firewalls –Biometrics Based Security l Soft biometrics l 2D/3D biometrics l Head based biometrics l Hand based biometrics l Project Output l Report l Presentation

Recommended Texts l Network Security: William Stallings, Cryptograph and Network Security: Principles and Practice, Prentice Hall, 1999/2003. – (Winner of the 1999 Award for the best Computer Science and Engineering textbook, awarded by the Text and Academic Authors Association, Inc.) l Biometrics Security: D. Zhang, Automated Biometrics: Technologies and Systems, Kluwer Academic Publisher, USA, D. Zhang, X. Jing and J. Yang, Biometric Images Discrimination (BID) Technologies, IRM Press, USA, D. Zhang, F. Song, Y. Xu and Z. Liang, Advanced Pattern Recognition Technologies with Applications to Biometrics, IGI Global, USA, 2008.

Reference Books l D. Zhang, Palmprint Authentication, Kluwer Academic Publishers, l W. Stallings, Network Security Essentials: Applications and Standard, Prentice Hall, l C.P. Pfleeger, Security in Computing, (2 Second Edition), Prentice Hall, l A.K. Jain, et al. (eds), Biometrics: Personal Identification in Networked Society, Kluwer Academic Publishers, l D. Zhang (ed.), Biometrics Solutions for Authentication in an E- World, Kluwer Academic Publishers, l G.W. Awcock, Applied Image Processing, McGraw-Hill, l M. Nadler and E.P. Smith, Pattern Recognition Engineering, Wiley Interscience, 1993.