代写CHC5226 Foundation of Security Semester 2, 2024-2025代做Java程序

Department of Computer Science

Semester 2, 2024-2025

CHC5226 Foundation of Security

Coursework (50%)

The coursework is divided into two parts, which together account for 50% of your total module score:

Part 1: Seminar Assessment (10%)

Students are required to demonstrate their progress on seminar-related tasks. Marks will be awarded during designated assessment weeks by the module instructor. Only completed tasks will receive full marks during the seminar. Failure to complete the seminar task will result in a score of zero. Make sure your computer/laptop is fully functional for each seminar session.

Part 2: Secure Scheme Design or Analysis Task (40%)

Students must prepare a report on one (1) of the following topics:

1.   Design a secure cryptographic scheme to protect against existing threats in various application environments such as IoT, cloud computing, smart cities, ad hoc vehicular networks, wireless sensor networks, and medical information systems.

2.   Analyze at least three recent papers (published within the last five years) focusing on the same research direction. Prepare a report highlighting the differences and assess which approach offers the most promising advancements.

Detailed Instructions for Part 2:

Submission Deadline: May 16, 2025, 2:00 PM

Word Limit: 3000 words, excluding title page, abstract, contents, acknowledgements, and references.

Penalty: Reports exceeding the word limit by 30% will be penalized.

Academic Integrity: This task is an individual piece of work. Adherence to the university's rules on plagiarism, syndication, and cheating is mandatory.

Report Components: Include an explanation of your results, with supporting graphs and diagrams where appropriate.

Referencing: Use IEEE style for all sources.

Learning Outcomes:

•     Demonstrate understanding of computer and information security fundamentals.

•     Evaluate the security of existing authentication schemes and identify security flaws.

•     Apply knowledge in secure coding, cryptography, and security analysis.

•     Utilize self-awareness and communication strategies in team-based work.

Important Information for Paper Selection

Requirements: Choose a recent paper(s) (last five years) from the provided list attached to this document. If you do not observe any potential improvements (Scheme Design), alignment with other papers (Analysis Task), you may have to select a different paper(s).

Research Focus: If selecting multiple papers, ensure they align in research focus and assess which offers the most promising advancements.

Procedure Compliance: Failure to follow these steps will render your submission incomplete. Avoid duplicating selections with peers. To ensure transparency and prevent overlap, after selecting your paper, you must upload the title to the link (Wechat Mini Program) that will be provided. This will allow all students to view the titles already chosen, thereby facilitating unique selections.You have to change your selection if it matches with any other student.

First Come, First Served: The student who uploads a title first will secure that  topic. Ifa title is already listed when you check, you must choose another paper. Regularly check the updated list of chosen titles before finalizing your selection to ensure it remains unique.

Journal List for Paper Selection:

Attached to this document, is a file containing a list of journals from which you can download papers relevant to your chosen topic, provided they have been published within the last five years. While you may select papers from any journal listed in the file, it is recommended that you focus your search on Pages 17 to 23, as these pages primarily list journals related to security, which is the central theme of our module. This will help you find the most pertinent and high-quality resources for your research and analysis.

To get an idea of what you should consider, have a look at some papers from the journal and conference papers (from the list attached). These papers can be downloaded through the CDUT library portal. You have to carefully read some papers, and choose one which is best suited for you. Scrutinize the paper to find the security flaws of their proposed scheme.

•   Describe the functionality of your designed scheme in detail.

•   Perform. background research on your chosen scheme. This should focus on the associated risks and vulnerabilities of similar schemes.

•   Perform a complete Threat Analysis of the scheme.

•   Write a secure design specification that mitigates risks and includes data use recommendations.

Marking Scheme:

•   Given the broad scope of the assignment, a detailed marking scheme is difficult to define. However, performance will be evaluated based on the thoroughness of the threat analysis, the clarity of the report, and adherence to the specified structure.

Things to look for in your report:

Ensure your report is well-organized and follows the structure outlined below, with each section clearly labeled:

Abstract (5%):

•  Provide a brief explanation of what you have done in your report.

•  Include a short  summary of the existing problems your research addresses, the background of your research, and the objectives of your work.

Introduction (10%):

•     Introduce the research domain and its importance.

•     Discuss the problems of the existing schemes and the specific objectives of your report.

Related Works (5%):

•  Review and discuss relevant literature that informs and supports your research.

Preliminaries (5%):

•  Outline the basic concepts, definitions, and background information necessary for understanding your design or analysis.

Design Scheme/Analysis of Different Schemes (45%):

•  Present your cryptographic scheme or analyze the different schemes you've studied.

•  Detail  the methodologies, technologies, and processes utilized  in the design or analysis.

Comparison Analysis (20%):

•  Compare and contrast the different schemes or methodologies analyzed.

•  Highlight key differences, strengths, and weaknesses.

Conclusion and Personal Reflection (5%):

•  Summarize your findings and contributions.

•  Reflect on the research process, what you learned, and potential future work.

References (5%):

•  List all sources cited in your report following the IEEE referencing style.



热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图