Checking date: 22/05/2025 16:18:26


Course: 2025/2026

Identification and Authentication
(12392)
Master in Cybersecurity (Plan: 325 - Estudio: 288)
EPI


Coordinating teacher: SANCHEZ REILLO, RAUL

Department assigned to the subject: Electronic Technology Department

Type: Compulsory
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
No further requirements in addition to those needed to be admitted in the Master Course.
Objectives
This course contributes to the following learning outcomes: Given a system with security requirements established to propose mechanisms and protocols required to provide some basic security services: authentication, authorization, privacy and access control. Give a measure of their effectiveness and limitations. Explain the security issues related to personal mobile devices in a given professional environment and apply the studied techniques to the secure systems engineering Evaluate the security architecture of a given vulnerable system and propose improvements. To design and evaluate appropriate measures for the identification and authentication of users and management of identities and associated authorizations. Understand legal and technical aspects related to cybersecurity.
Learning Outcomes
Description of contents: programme
During this course the student will acquire the technical knowledge about identification and authentication processes. He/she will get familiar with the different identification and authentication schemes and devices, including the major biometric modalities and the identity management systems. Finally the main concepts related to privacy and legal environment will be given, related to identification and authentication. Programme: 1. User authentication 1.1. Concepts and definitions 1.2. Authentication schemes. Multi-factor authentication 1.3. Robust authentication. Authentication by digital signature 1.4. Security analysis 1.5. Authentication architectures. Kerberos 2. Biometric Recognition 2.1. Definitions and working principles 2.2. Biometric systems 2.3. Security, privacy and practical aspects 3. Identity management 3.1. Life cycle of the digital identity 3.2. Identity management in distributed systems 3.3. Standards and federated systems 4. Ethical aspects and legislation associated with privacy, and its relationship with SDG. 4.1. Identification related standardization 4.2. GDPR
Learning activities and methodology
LEARNING ACTIVITIES: - Theretical lectures - Theoretical-Practical lectures - Office hours - Work-sharing homework - Individual homework METHODOLOGY: - Professor dissertations using computer and audiovisual means, explaining the main concepts involved and providing those relevant references to allow students to get more in depth in the subject. - Critical reading of international references recommended by the professor. - Jornal papers, reports and manuals for further discussion in class, to enhance and consolidate the knowledge acquired. - Solving practical cases, presented by the professor to the students either individually or in groups - Presentation and discussion in class, under the moderation of the professor, of subjects related to the course. - Development of individual or group reports.
Assessment System
  • % end-of-term-examination/test 60
  • % of continuous assessment (assigments, laboratory, practicals...) 40

Calendar of Continuous assessment


Basic Bibliography
  • Anil K. Jain. Biometrics : personal identification in networked society. Kluwer Academic. 2005
  • Anil K. Jain, Raúl Sánchez Reíllo, et. al.. Encyclopedia of Biometrics. Springer. 2015
  • Finkenzeller, Klaus.. RFID handbook : fundamentals and applications in contacless smart cards and identification. Wiles and Sons.
  • Li, Stan Z.. Encyclopedia of Biometrics, vols. 1 and 2. Springer. 2009
  • Patrizio Campisi. Security and Privacy in Biometrics. Springer. 2013
  • Rankl, Wolfgang. Smart card handbook. John & Wiley & Sons.
  • Raúl Sánchez Reíllo, et. al.. User-Centric Privacy and Security in Biometrics. IET. 2017
  • Raúl Sánchez Reíllo, et. al.. Iris and Periocular Biometric Recognition . IET. 2017
  • Wayman, James.. Biometric systems : technology, design, and performance evaluation.. Springer.

The course syllabus may change due academic events or other reasons.