|
|
|
|
Lecture Slides
|
- Lecture 1
(PDF)
(6-up PDF)
(Jan 10, 2005)
- administrative, hw1
- Lecture 2
(PDF)
(6-up PDF)
(Jan 12, 2005)
- introduction to security systems
- (Jan 17, 2005) - holiday
- Lecture 3
(PDF)
(6-up PDF)
(Jan 19, 2005)
- introduction to security systems
- Lecture 4
(PDF)
(6-up PDF)
(Jan 24, 2005)
- cryptography (basic ciphers, stream ciphers)
- Lecture 5
(PDF)
(6-up PDF)
(Jan 26, 2005)
- cryptography (block ciphers, DES)
- Lecture 6
(PDF)
(6-up PDF)
(Jan 31, 2005)
- hw2, cryptography (DES modes)
- Lecture 7
(PDF)
(6-up PDF)
(Feb 2, 2005)
- public-key cryptography (RSA, digital signature)
- Lecture 8
(PDF)
(6-up PDF)
(Feb 7, 2005)
- public-key cryptography (hash functions, signing with hashes)
- Lecture 9
(PDF)
(6-up PDF)
(Feb 9, 2005)
- public-key cryptography (message authentication code),
key management (introduction)
- Lecture 10
(PDF)
(6-up PDF)
(Feb 14, 2005)
- key management (Needham-Schroeder, Kerberos)
- Lecture 11
(PDF)
(6-up PDF)
(Feb 16, 2005)
- key management (public-key distribution)
- (Feb 21, 2005) - holiday
- Lecture 12
(PDF)
(6-up PDF)
(Feb 23, 2005)
- key management (key management in practice),
SHA1 broken, hw4
- Lecture 13
(PDF)
(6-up PDF)
(Feb 28, 2005)
- midterm review, key management (key management in practice)
- (Mar 2, 2005) - midterm exam
- Lecture 14
(PDF)
(6-up PDF)
(Mar 7, 2005)
- key management (group key management)
- Lecture 15
(PDF)
(6-up PDF)
(Mar 9, 2005)
- key management (group key management), authentication
- (Mar 14, 2005) - spring recess
- (Mar 16, 2005) - spring recess
- Lecture 16
(PDF)
(6-up PDF)
(Mar 21, 2005)
- authentication, authentication in applications
- Lecture 17
(PDF)
(6-up PDF)
(Mar 23, 2005)
- authentication in applications (short class due to CSD
Distinguished Lecture)
- Lecture 18
(PDF)
(6-up PDF)
(Mar 28, 2005)
- authentication in applications, authorization
- Lecture 19
(PDF)
(6-up PDF)
(Mar 30, 2005)
- authorization (policy)
- Lecture 20
(PDF)
(6-up PDF)
(Apr 4, 2005)
- authorization (policy), intrusion detection
- Lecture 21
(PDF)
(6-up PDF)
(gray PDF)
(6-up gray PDF)
(Apr 6, 2005)
- modeling strength of security
(guest lecture given by
Ho Chung)
- Lecture 22
(PDF)
(6-up PDF)
(Apr 11, 2005)
- intrusion detection
- Lecture 23
(PDF)
(6-up PDF)
(Apr 13, 2005)
- cybersecurity : careers, certifications, and security lab
(guest lecture given by
Prof.
Ashish Soni)
- Lecture 24
(PDF)
(6-up PDF)
(Apr 18, 2005)
- evaluation of malicious activity on the Internet
(guest lecture given by
Alefiya Hussain
- Lecture 25
(PDF)
(6-up PDF)
(Apr 20, 2005)
- intrusion detection, collaborative intrusion detection, wireless security
- Lecture 26
(PDF)
(6-up PDF)
(Apr 25, 2005)
- wireless security, scalable wide-area upload
- Lecture 27
(PDF)
(6-up PDF)
(Apr 27, 2005)
- scalable wide-area upload, privacy
|
|
Tentative Slides
|
The following are tentative slides (in PDF format) for this semester.
They are subject to change without notice.
|
|
|