Course Schedule Spring 2015

This schedule is subject to change. Please check back frequently.


Date Topic Readings
Mar. 31 Security and Crypto Basics I
Apr. 2 Security and Crypto Basics II
Apr. 9 Crypto Failures

Assigned:

Recommended:

Apr. 10 TLS and HTTPS

Assigned:

Recommended:

Apr. 14 Passwords

Assigned:

Recommended:

Apr. 16 Usable Security

Assigned:

Recommended:

Apr. 21 Web Security

Assigned:

Recommended:

Apr. 23 Isolation

Assigned:

Recommended:

Apr. 28 Trusted Computing

Assigned:

Recommended:

Apr. 30 BFT

Assigned:

May. 5 Untrusted Cloud I

Assigned:

Recommended:

May. 7 Untrusted Cloud II

Assigned:

Recommended:

May. 12 Untrusted Cloud III

Assigned:

May. 14 Verifiable Computation I

Assigned:

Recommended:

May. 21 Verifiable Computation II

Assigned:

Recommended:

May. 22 Privacy and Web Advertising

Assigned:

Recommended:

May. 26 Anonymity and Anticensorship

Assigned:

Recommended:

May. 28 Cryptocurrencies

Assigned:

Recommended:

Jun. 2 Vulnerabilities in Cloud-Hosted VMs

Assigned:

Recommended:

Jun. 4 Secure Deletion

Assigned:

Recommended:

Unfortunately, some articles require a paid subscription to a journal or digital library. These articles are linked via the UChicago library proxy, and you must authenticate with your CNetID to view them.