¹û¶³Ó°Ôº

XClose

¹û¶³Ó°Ôº Module Catalogue

Home
Menu

MSc Information Security Dissertation (COMP0064)

Key information

Faculty
Faculty of Engineering Sciences
Teaching department
Computer Science
Credit value
60
Restrictions
Module delivery for PGT (FHEQ Level 7) available on MSc Information Security.
Timetable

Alternative credit options

There are no alternative credit options available for this module.

Description

Aims:

Students will obtain experience of undertaking and completing a piece of research, applying techniques learned throughout the programme, including the technical skills of analysis, design and implementation.

Intended learning outcomes:

On successful completion of the module, a student will be able to:

  1. Work individually developing a major project.
  2. Plan and coordinate development activities.
  3. Make realistic work commitments.
  4. Present the research done effectively to a deadline.

Indicative content:

Students work individually or in groups on a research topic together with a supervisor. Frequently, the supervisor is one of ¹û¶³Ó°Ôº's lecturers on the MSc in Information Security programme, but students can also work with other academic staff at ¹û¶³Ó°Ôº or with an external supervisor from industry. The workload of the thesis corresponds to four modules.

The project runs from immediately after the examination period (May) with the students responsible for organising themselves and their work, with advice from their supervisor. Students are expected to meet with their supervisor on a regular basis, as agreed with the supervisor. The main report documents the results of the project.

The deadline for submission is usually in lateÌýAugust to early September. The dissertation text (defined as everything except title page, table of contents, references and appendices) should not exceed 50 pages in 12-point type andÌý1.5 or double spacing for an individual report.

The total dissertation length (main text together with appendices) should under no circumstances exceed 100 pages for an individual report. For group projects, each extra group member increases the allowance by 30 pages in the main body, and 30 pages in the appendices.

Examples of recent project titles:

  • Algebraic Attack on Smart Cards.
  • Algebraic Cryptanalysis of Ciphers.
  • Anti-Phishing: Secure, Usable and Low-Cost Authentication For Secure and Convenient Online Banking Security and Payment Systems.
  • Comparing Authentication Methods.
  • Computer Security by Strip Searching.
  • Cryptanalysis Of Keeloq.
  • Defence Against Profile Injection Attacks.
  • Fuzzy Private Matching and Privacy Preserving.
  • Implementing Default Capabilities to Fight Computer Malware.
  • Integration Of Biometrics in Identity Management.
  • Maliciously Created Routing Loops in Mobility Protocols.
  • Mobile Phone Security.
  • Model Checking Security Protocols.
  • Modelling The Information Content of Rumour Propagation.
  • Perfectly Secure Communication Over General Adversary Structures in Arbitrary Networks with Feedback Channels.
  • Privacy: Dataveillance as Differential Pricing and Social Sorting.
  • Private Information Retrieval.
  • Topological Characterisation of Email Communications.
  • Trusted Computing.
  • Verification of TESLA (or Variant Dining Cryptographers) Protocol Using MCMAS.

Requisites:

To be eligible to select this module, a student must be registered on a programme and year of study for which it is a formally available.

Module deliveries for 2024/25 academic year

Intended teaching term: Terms 2 and 3 ÌýÌýÌý Postgraduate (FHEQ Level 7)

Teaching and assessment

Mode of study
In person
Methods of assessment
100% Dissertations, extended projects and projects
Mark scheme
Numeric Marks

Other information

Number of students on module in previous year
32
Module leader
Mr Mark Warner
Who to contact for more information
cs.pgt-students@ucl.ac.uk

Last updated

This module description was last updated on 8th April 2024.

Ìý