Studying at the University of Verona

Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.

This information is intended exclusively for students already enrolled in this course.
If you are a new student interested in enrolling, you can find information about the course of study on the course page:

Laurea magistrale in Ingegneria e scienze informatiche - Enrollment from 2025/2026

The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.

CURRICULUM TIPO:

1° Year 

ModulesCreditsTAFSSD
12
B
ING-INF/05
12
B
ING-INF/05
6
B
ING-INF/05
6
B
ING-INF/05

2° Year   activated in the A.Y. 2011/2012

ModulesCreditsTAFSSD
6
B
INF/01
Altre attivita' formative
4
F
-
ModulesCreditsTAFSSD
12
B
ING-INF/05
12
B
ING-INF/05
6
B
ING-INF/05
6
B
ING-INF/05
activated in the A.Y. 2011/2012
ModulesCreditsTAFSSD
6
B
INF/01
Altre attivita' formative
4
F
-
Modules Credits TAF SSD
Between the years: 1°- 2°

Legend | Type of training activity (TTA)

TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.




S Placements in companies, public or private institutions and professional associations

Teaching code

4S02798

Coordinator

Luca Vigano'

Credits

6

Language

Italian

Scientific Disciplinary Sector (SSD)

ING-INF/05 - INFORMATION PROCESSING SYSTEMS

Period

II semestre dal Mar 1, 2011 al Jun 15, 2011.

Learning outcomes

The objective of the course is to introduce the principal methodologies and technologies for the security of computer networks, of distributed information systems, and of service-oriented software architectures. The course thus provides the main theoretical and applied notions for the theoretical design, the practical realization and the formal analysis of protocols, networks, systems and architectures for information security.

Program

- Basic notions:
-- Objectives, risks, attacks
-- Public-key infrastructures
-- Communication channels
-- Case studies (X.509, PGP)
- Protocols:
-- Risk and attack models
-- Formal analysis techniques
-- Case studies (Kerberos, Internet Key Exchange, IP Security)
- Privacy and anonymity:
-- Policies, problems and mechanisms (pseudonyms and proxies)
-- Case studies (Mix Networks and Crowds)
- Security of Web Services and service-oriented architectures.

Examination Methods

The examination consists of a written test, including questions about the theoretical notions considered in the course as well as small exercises on practical notions.
The written test must be taken without the help of notes, books, or other documentation. The teacher may decide to replace the written test with an oral examination, especially whenever it is not possible to make sure that the students cannot access this documentation.

Students with disabilities or specific learning disorders (SLD), who intend to request the adaptation of the exam, must follow the instructions given HERE