Course URL: http://www.cs.cornell.edu/Courses/CS5430/2013SP/
10:10 -- 11:25am Monday and Wednesday. Thurston 205
Available directly after class and most Mon / Wed afternoons.
But feel free to drop by anytime without an appointment, and either I will
meet with you then or work out a time that day when we can meet.
Email is great for questions that require a short answer and
don't require much context.
However, email is a horrible way to have a conversation, and
most questions about course content and procedures
Besides, live interactions are more fun and more efficient.
Students are therefore urged to email the instructor only when it is
sensible. For example, email is a sensible way to set up an appointment
to speak in person with the instructor---include choices for days and
times that you are available.
Elisavet Kozyri, Upson 5148, email: firstname.lastname@example.org .
TA Office Hours:
|Mon.||4pm - 6pm||Upson 360, Bay C|
|Tues.||2pm - 4pm||Upson 360, Bay C|
|Wed .||4pm - 6pm||Upson 360, Bay C|
|Thurs.||2pm - 4pm||Upson 360, Bay C|
A text having a large intersection with what we will cover this semester and having a broad coverage of computer security at the MEng level is:
The following books, on-reserve in Carpenter Library, should also prove useful references on cryptographic protocols. Schneier's book is a classic reference and well worth owning. The Kaufman et al. text is a delightfully written treatment.
Assignments and Grading. Assignments are deliberately underspecified, open-ended, and motivated by problems that arise in the real world (messy as it is) as is consistent with the MEng, hence professional (and practical) orientation, of this course. So you will have to think on your own, refine problem specifications, make reasonable and defensible assumptions, and be creative. Success in CS5430 (and in life) depends heavily on you figuring out what's important and concentrating on that.
Your final course grade will be computed as follows:
Homeworks and projects will receive letter grades, which should be interpreted as follows.
|A:||Paper "as is" could be posted as the solution set.|
|B:||Paper has small technical problems (though not many) and has no flaws that suggest fundamental misconceptions about the material or task.|
|C:||Paper reflects deep misunderstandings of some aspects and/or significant additional work is still required.|
All assignments are due on the date stipulated, so that correct answers can be freely discussed in lecture after the due date. Late submissions will receive a grade deduction of two "1/2 letters". (E.g., A becomes B+; A- becomes B; B+ becomes B-, etc).
Academic integrity violations will be prosecuted aggressively. Collaborate with your group on the project; do not discuss or collaborate with anyone on the assigned homeworks.
Students are expected to be familiar with the University's and the CS Department's various policies on appropriate use of computers.