Date |
Topic and readings |
---|---|
09/27/2006 Course Introduction |
Assigned Readings: None
|
10/02/2006 Usability |
Assigned Readings:
|
10/04/2006 Usability |
Assigned Readings:
|
10/09/2006 Usability and Ubiquitous Devices |
Assigned Readings:
|
10/11/2006 RFIDs |
Presenter: Nick. Assigned Readings:
|
10/16/2006 Limits of Encryption |
Assigned Readings:
|
10/18/2006 Covert Channels |
Presenter: Carl. Assigned Readings:
|
10/20/2006 Project |
Project proposals due. |
10/23/2006 Social Applications (Guest Lecture: David W. McDonald) |
Guest Lecture: David W. McDonald. Assigned Readings: None.
Related Papers:
|
10/25/2006 Electronic Voting (Guest Lecture: Josh Benaloh) |
Guest Lecture: Josh Benaloh. Title: Verifiable Election Technologies: Simplifying a Quarter Century of Research Abstract: Extensive cryptography research over last quarter century has produced verifiable election protocols which offer integrity guarantees far better than any widely-deployed election technology, yet these methodologies have rarely (if ever) been used in actual elections. One reason for this lack of use is the complexity of these techniques. This talk reviews some of the historical approaches to cryptographic elections and describes a relatively simple but still effective approach to achieving verifiability in elections. By sacrificing some of the properties of prior verifiable election designs, it is possible to offer a design which is more accessible and therefore more suitable for broad public consumption. Bio: Josh Benaloh is a cryptographer at Microsoft Research. He earned his bachelor's degree from M.I.T. in 1981, and his Ph.D. from Yale University in 1987 where his dissertation "Verifiable Secret-Ballot Elections" and other writings introduced the so-called "homomorphic" paradigm for cryptographic elections. Before joining Microsoft in 1994, he served as a postdoctoral fellow at the University of Toronto and an Assistant Professor at Clarkson University. He has served as a director of the International Association for Cryptologic Research since 1999 and was the General Chair of the Crypto 2006 conference held this past August. Assigned Readings: None. Related Papers:
|
10/30/2006 Information Hiding and DRM |
Presenter: Tanya. Assigned Readings:
Additional/Related Papers: We will discuss some of these papers, but you are not required to read them.
|
11/01/2006 |
No class. |
11/06/2006 Worms |
Assigned Readings:
Additional/Related Papers:
|
11/08/2006 |
No class.
|
11/13/2006 Malware |
Presenter: Alex. Assigned Readings:
Additional/Related Papers:
|
11/15/2006 (Date Change) |
Assigned Readings:
Related Papers:
|
11/20/2006 Malware |
Assigned Readings:
|
11/22/2006 Identity Theft and Worms |
Assigned Readings: Please read and review two of the following three papers.
|
11/27/2006 Botnets and Spam (Date Change) |
Presenter: Harsha. Assigned Readings:
|
11/29/2006 Humans in Protocols and Worms |
Assigned Readings: Please read and review two of the following three papers.
|
12/04/2006 Humans in Protocols, Network Security, and Virtualization |
Assigned Readings:
|
12/06/2006 Anonymity |
Assigned Readings:
|