Difference between revisions of "Lecture 6"
From CyberSecurity
(One intermediate revision by the same user not shown) | |||
Line 5: | Line 5: | ||
==Readings== | ==Readings== | ||
− | Ken Thompson, “[http://www.cse.ucsd.edu/users/voelker/cse291/fa05/thompson-trust-cacm84.pdf Reflections on Trusting Trust],” Communications of the ACM 27(8), August | + | * Ken Thompson, “[http://www.cse.ucsd.edu/users/voelker/cse291/fa05/thompson-trust-cacm84.pdf Reflections on Trusting Trust],” Communications of the ACM 27(8), August 1984. |
− | + | * Alma Whitten and J.D. Tygar, “[http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.pdf Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0],” Proc. USENIX Security Symposium, August 1999. | |
− | Alma Whitten and J.D. Tygar, “[http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.pdf Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0],” | + | * Ross Anderson, “[http://www.cl.cam.ac.uk/ftp/users/rja14/wcf.pdf Why Cryptosystems Fail],” Communications of the ACM 37(11), November 1994. |
− | |||
− | Ross Anderson, “[http://www.cl.cam.ac.uk/ftp/users/rja14/wcf.pdf Why Cryptosystems Fail],” Communications of the ACM 37(11), November | ||
− | |||
==Discussion== | ==Discussion== | ||
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_6 wiki-discussion]. | Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_6 wiki-discussion]. |
Latest revision as of 04:32, 6 October 2005
Computer Security Primer
Speakers
Geoff Voelker, UCSD
Readings
- Ken Thompson, “Reflections on Trusting Trust,” Communications of the ACM 27(8), August 1984.
- Alma Whitten and J.D. Tygar, “Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0,” Proc. USENIX Security Symposium, August 1999.
- Ross Anderson, “Why Cryptosystems Fail,” Communications of the ACM 37(11), November 1994.
Discussion
Participate in the wiki-discussion.