| Computer Security lecture notes | Copyright © 2004 Mark Dermot Ryan The University of Birmingham Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, |
| Week |
Monday
14:00, UG07 Lrn.Ctr. |
Thursday
13:00, G35 Chem.Eng. |
||
| 1 |
12
Jan |
L1 - Introduction/overview: threats, risk, vulnerabilities and impact | 15
Jan |
L2 - Symmetric key encryption |
| 2 |
19 Jan | L3 - Secure one-way hash functions | 22
Jan |
L4 - Public key encryption |
| 3 |
26
Jan |
L5 - Secure protocols | 29
Jan |
L6 - Key certificates and PGP |
| 4 |
2
Feb |
L7 - Trusted Computing and NGSCB | 5 Feb |
No lecture |
| 5 |
9
Feb |
GL1
- Harj Singh, Synetrix Ltd Effective security. |
12
Feb |
SS1
- Spyware and Trojan horses Tim, Kumutha, Andy Supervisor: Mark Ryan |
| 6 |
16
Feb |
SS2
- Zero knowledge
protocols Chris, Andrew, Nicholas Supervisor: Stefano Cattani |
19
Feb |
GL2
- Steve Kremer, Brussels University. |
| 7 |
23
Feb |
SS3
- Biometrics Robert, Mamta, Parmajit Supervisor: Mark Ryan |
26
Feb |
SS4
- Digital Cash Amit, Hiren, Kevin, Kai Supervisor: Stefano Cattani |
| 8 |
1
Mar |
No lecture |
4
Mar |
SS5
Steganography and digital
watermarking Patrick, Samuel, Robert, Jonathan Supervisor: Stefano Cattani |
| 9 |
8
Mar |
SS6
- Language security Adam, Peter Supervisor: Mark Ryan |
11
Mar |
SS7
- Wifi and bluetooth security André, Tom, Alex Supervisor: Mark Ryan |
| 10 |
15
Mar |
SS8a
- SSL Till SS8b - DDOS Mark Supervisor: Stefano Cattani |
18 Mar |
Wrap-up and feedback |