The newsgroup is for questions/discussion on homeworks and programming assignments. But do not post solutions (code or write-up) to the newsgroup! Use email only when you cannot use the newsgroup, e.g., for urgent/personal questions.
A basic network programming course is a prerequisite. An equivalent
course in Operating Systems or Networking is also acceptable with the
approval of the instructor. Knowledge of prior security courses is
desirable but not essential.
A student scoring an 'A' grade in this course will be able to engineer
practical privacy enhancing technologies, critically review existing
designs, read and understand technical papers in the area of anonymous
communications, privacy preserving technologies, private social
networks and learn to apply the privacy-by-design methodology.
| Topic | Reading/Slides | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| L1 | Course introduction | ||||||||||||||||||||||||||||||||||
| L2 | Introduction to PETS | Privacy-enhancing Technologies for the Internet , IEEE Spring COMPCON, 1997. |
|||||||||||||||||||||||||||||||||
| L3 | Introduction to PETS | Privacy-enhancing technologies for the
Internet II: Five years later , PET 2002. |
|||||||||||||||||||||||||||||||||
| L4 | Anonymous communications | Untraceable electronic mail, return addresses, and
digital pseudonyms , Communications of the ACM, 1981. |
|||||||||||||||||||||||||||||||||
| L5 | Anonymous communications | Mixminion: Design of a Type III Anonymous Remailer
Protocol , IEEE SSP (Oakland) 2003. |
|||||||||||||||||||||||||||||||||
| L6 | Anonymous communications | Towards an Analysis of Onion Routing Security , PET 2000. |
|||||||||||||||||||||||||||||||||
| L7 | Anonymous communications | Tor: The Second-Generation Onion
Router , USENIX Security, 2004. |
|||||||||||||||||||||||||||||||||
| L8 | Censorship resistance and anonymous publishing | The Eternity Service , Pragocrypt 1996. |
|||||||||||||||||||||||||||||||||
| L9 | Censorship resistance and anonymous publishing | Freenet: A Distributed
Anonymous Information Storage and Retrieval System , PET 2000. |
|||||||||||||||||||||||||||||||||
| L10 | Censorship resistance and anonymous publishing | Tangler: a censorship-resistant
publishing system based on document entanglements , ACM CCS 2001. |
|||||||||||||||||||||||||||||||||
| L11 | Traffic analysis | Traffic Analysis
Attacks and Trade-Offs in Anonymity Providing Systems , IH 2001. |
|||||||||||||||||||||||||||||||||
| L12 | Traffic analysis | The Traffic Analysis of Continuous-Time
Mixes , PET 2004. |
|||||||||||||||||||||||||||||||||
| L13 | Traffic analysis | Low-Cost Traffic Analysis of
Tor , IEEE SSP (Oakland) 2005. |
|||||||||||||||||||||||||||||||||
| L14 | Traffic analysis | Low-Cost Traffic Analysis of
Tor , PETS 2007. |
|||||||||||||||||||||||||||||||||
| L15 | Privacy and social networks | Persona: An Online Social Network with User-Defined Privacy , ACM SIGCOMM 2009 L16
| Privacy and social networks
|
| L17
| Privacy and social networks
|
| L18
| Privacy preserving computation
|
| L19
| Privacy preserving computation
|
| L20
| Privacy preserving computation
|
| L21
| Policy and Economics
|
| L22
| Policy and Economics
|
| L23
| Privacy-by-design
|
| L24
| Privacy-by-design
|
| L25
| Revision
|
| L26
| Revision
|
| |