Expected learning outcomes
Give the students an improved understanding of
- different authentication methods for example passwods/PIN, gait, signature, keystroke dynamics, tokens.
- testing of authentication methods
- Authentication in a security context. What can one assume with respect to adversary capabilities?
- Selected authentication methods for example passwods/PIN, gait, signature, keystroke dynamics, tokens.
- Technics to test autentication methods
Form(s) of Assessment
Form(s) of Assessment (additional text)
An overall evaluation based on a 100 point scale, where project work counts 50 points and final exam (3 hours) counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.
Alphabetical Scale, A(best) – F (fail)
For the final exam: Ordinary re-sit examnination.
There exists a reader written by the professor. The reader is given to the students at the beginning of the course.
In case there will be less than 5 students that will apply for the course, it will be at the discretion of Studieprogramansvarlig whether the course will be offered or not an if yes, in which form.