See last page.
Date | Lecture | Topic covered | Speaker |
9/17 | 1 | Cryptography | Tygar |
9/24 | 2 | Cryptography | Tygar |
10/1 | 3 | Cryptography | Tygar |
10/8 | 4 | Authentication | |
Intro [AN95a] | Wing | ||
Flaws | Butler | ||
10/15 | 5 | Formal Methods (Logics) | |
Intro [RH93], BAN[BAN89] | Wing | ||
BAN variants and controversy | Hu, Song, and Tew | ||
10/20 (M 1:30-3:00) | 6 | Formal Methods (Models) | Wing |
[DY89, AT91, HT96, WL93] | |||
10/22 (till 3:00) | 7 | Design Issues | |
Design Principles | Berezin and Myers | ||
Usability | Whitten | ||
10/29 | 8 | Formal Methods (Tools) | |
Intro | Wing | ||
Model Checking | Marrero and Sweitzer | ||
Theorem Proving | Dreyer and Kindred | ||
11/5 | 9 | Electronic Commerce | |
Watermarking | Ruanaidh (guest lecturer) | ||
Intro to EC | Tygar | ||
11/12 | 10 | Electronic Commerce | |
Anonymous cash | Wang and Yu | ||
Electronic voting | Dubois-Ferriere and He | ||
Electronic auctions | Harkavy and Kikuchi | ||
Watermarking and Rights management | Perrig and Willmott | ||
11/17 (M 1:00-3:30) | 11 | Advanced Crypto Topics | |
Elliptic curve crypt. | Uther | ||
Lattice crypt. | Rapkin | ||
Differential cryptanalysis. | Laurens | ||
11/19 | 12 | Advanced Security Topics | |
Trust management | Halldorsson and Thorsteinsson | ||
Key escrow | Lim and Timourian | ||
Code-level security (SFI, PCC, etc.) | Bijansky, Ichimaru, and Lozev | ||
Code-level security (Java JDK, etc.) | Chan and Chu | ||
11/27 | Thanksgiving | ||
12/3 | No Class | ||
12/6 | Project Write-ups Due |