Hauptseminar Technischer Datenschutz
Current news:
- Despite the emergency operation at the TU Dresden, the seminar will take place this semester. You can find general announcements related to the emergency operation at our chair on the corresponding info page.
- If you intend to participate in the seminar, please enlist in the corresponding OPAL course. Any updates related to the seminar will be announced via OPAL. If you experience difficulties with enlisting or else, please contact Martin Byrenheid.
Description
This seminar aims to convey the skills that are needed to perform a thorough literature research in the area of privacy and security and to communicate its results in a manner suitable to a scientic audience. For the latter, the seminar mimics the process of a scientific conference, where authors first submit papers for review and upon a positive review, afterwards present their work in a short presentation to the other attendants.
In contrast to a real scientific conference, the reviews are done by the participants of the seminar, and each student will receive at least one review by their supervisor.
The seminar will proceed in the following phases:
- Literature research & writing: Each participant will choose a topic (topic suggestions can be found below) and perform a scientific literature research to assess the current state of the art with regards to that topic. Furthermore, each participant will write a report that summarizes, compares and discusses the discovered literature. At the end of the phase, every participant will submit its written report for peer review.
- Peer Review: Depending on the number of participants, 1 or 2 papers will be assigned to every participant for peer review. "Reviewing" means that the report is read in depth and, if necessary, suggestions for improvement are made. The reviews will be double-blinded: the authors will not know who reviewed their report, and the reviewers will not know who wrote the report they review.
- Revision: Each participant will receive the reviews to their report and improve the report accordingly.
- Presentation: Every participant will give a talk about the results from its literature research.
The precise deadlines for each phase can be found further down the page under "Important Dates".
INFORMATION
Diplom Informatik (Prüfungsordnung 2004) (Hauptstudium, ab 5. Semester),
Diplom Medieninformatik (Prüfungsordnung 2004) (Hauptstudium, ab 5. Semester),
Diplom Informationssystemtechnik (Hauptstudium, ab 5. Semester),
Master Informatik (INF-AQUA)
Diplom Informatik (INF-D-940)
Hauptseminar
Hauptstudium, ab 5. Semester
Vorlesungen Security and Cryptography I und II, Kryptographie und Kryptoanalyse oder vergleichbare Veranstaltungen aus dem Gebiet Datenschutz und Datensicherheit
Seminar: 2 SWS
Leistungsnachweis in Form einer Ausarbeitung und eines Vortrags
Tuesday, 4. DS, 13:00 - 14:30, APB/E006
or online (details will be announced)
- Kommunikation erfolgt über E-Mail mit Hilfe von OPAL
- Einschreibung über jExam und OPAL
- Einschreibungstermin jExam: Ab sofort möglich!
- Einschreibung OPAL: ab sofort
- Studenten, die sich nicht in die LV über jExam einschreiben können, wenden sich bitte per Email ans Sekretariat (martina.gersonde@tu-dresden.de) mit folgenden Angaben:
- Name, Vorname
- Matrikel-nr
- Studiengang
- in welchem Modul wollen Sie die LV einbringen
- OPAL bitte selbständig einschreiben
Links & Resources
Important dates
The following list shows the program for the seminar in this semester. We include the dates of defenses and colloquia at our chair, as you should attend them to learn about current research at our chair and see examples of scientific presentations. Whenever an event (e.g. kickoff meeting and defenses) is listed, the event will start at 1 p.m. on the corresponding day.
06.4.
13.4. Welcome meeting (BBB-Link)
18.4. Deadline for sending of topic preferences
19.4. Announcement of topic assignment
20.4. Introduction to literature research (BBB-Link)
27.4. Deadline for getting in contact with topic supervisor
- Diploma Defense: Untersuchungen zur Durchsetzbarkeit des Schutzziels Verfügbarkeit in 5G-Netzen unter Berücksichtigung nicht-vertrauenswürdiger Hersteller von 5G-Komponenten
- Colloquium: A Security-centric Stakeholder Model for Future Smart Meter Gateways
04.5.
11.5. Introduction to scientific writing (BBB-Link)
18.5.
25.5. ** Pentecost holiday **
01.6.
08.6.
15.6. Paper submission & Introduction to peer review (BBB-Link)
22.6. Review claiming ends
25.6.
29.6. Reviews due
05.7.
06.7. Deadline for revised paper
13.7.
20.7. Presentation of results (BBB-Link)
TOPICS
A list with topic proposals will be published here unti April 9th. However, each student is encouraged to propose own topics of interest from the area of security and privacy. If you would like to work on a topic not included in the following list, please send an email to Martin Byrenheid.