Tag: Encryption

Introduction to Modern Cryptography 2012

Cryptography has a very long and exciting history. For centuries, political leaders and military forces have used cryptographic techniques, primarily to communicate securely. Modern cryptography is concerned with an enormous variety of scenarios where the involved parties do not fully trust each other such as internet banking, electronic voting, integrity of data, security of computer …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/18/introduction-modern-cryptography-2012/

CS 290G: Secure Computation (Spring 2014)

Course Description With the growing demand for security and privacy, the field of cryptography has expanded rapidly in the past three decades. Beyond the original goal of ensuring secure communication, innovative and powerful concepts and primitives have emerged that enable new secure paradigm of computing. In this course, we will survey some of the exciting …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/15/cs-290g-secure-computation-spring-2014/

Online Audio and Video Lectures on Computer Networking

Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html

Permanent link to this article: http://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/

Introduction to Computer Networking

This course provides an introduction to fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics to be covered include: overview of  network architectures, applications (HTTP, FTP), network programming interfaces (e.g., sockets), transport (TCP, UDP), flow control, congestion control, IP, routing , IPv6, multicast, data link protocols, error-detection/correction, multiple …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/introduction-computer-networking/

Audio/Video Recordings about Wireless and Mobile Networking

CSE574:Wireless and Mobile Networks (2010) – Podcasts available: (2008, 2006 also available) Course Overview | Wireless Networking: Issues and Trends | Wireless Physical Layer Concepts: Part I, Part II, Part III | Wireless Local Area Networks: Part I, Part II | Wireless Personal Area Networks: Part I, Part II | Wireless Metropolitan Area Networks: Part …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/audiovideo-recordings-wireless-mobile-networking/

CS 276, Spring 2006 Cryptography

  http://www.cs.berkeley.edu/~daw/teaching/cs276-s06/

Permanent link to this article: http://www.darknessgate.com/2014/09/10/cs-276-spring-2006-cryptography/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

Course F21CN: Computer Network Security

The purpose of Course F21CN Computer Network Security is to provide a solid understanding of the main issues related to security in modern networked computer systems. This covers underlying concepts and foundations of computer security, basic knowledge about security-relevant decisions in designing IT infrastructures, techniques to secure complex systems and practical skills in managing a …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/07/course-f21cn-computer-network-security/

Cryptography and Computer Security (CCS)

This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security. Course goal is introduction to algorithms and fundamentals of security protocols and technics. The …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/06/cryptography-computer-security-ccs/

Security and Cryptography (CSS 322)

This course aims to introduce you to the principles and techniques of securing computers and computer networks, with focus on Internet security. The course is effectively split into two parts: first introducing the theory of cryptography, including how many classical and popular algorithms work (e.g. DES, RSA, digital signatures); and second providing details of real …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/04/security-cryptography-css-322/

Introduction to Computer Security, Spring 2014

Course Objectives: Ever since the first worm, Morris Worm, released through the Internet in 1988, the attack-defense game between hackers and administrators never ends. To better protect our ICT (Information and Communications Technology) systems, we need to understand first what hacking techniques have been developed over the years and then see their countermeasures. This course …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/03/introduction-computer-security-spring-2014/