Difference between revisions of "Lecture 6"

From CyberSecurity
Jump to: navigation, search
 
(One intermediate revision by the same user not shown)
Line 5: Line 5:
  
 
==Readings==
 
==Readings==
Ken Thompson, “[http://www.cse.ucsd.edu/users/voelker/cse291/fa05/thompson-trust-cacm84.pdf Reflections on Trusting Trust],” Communications of the ACM 27(8), August
+
* Ken Thompson, “[http://www.cse.ucsd.edu/users/voelker/cse291/fa05/thompson-trust-cacm84.pdf Reflections on Trusting Trust],” Communications of the ACM 27(8), August 1984.
  1984.
+
* Alma Whitten and J.D. Tygar, “[http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.pdf Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0],” Proc. USENIX Security Symposium, August 1999.
Alma Whitten and J.D. Tygar, “[http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.pdf Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0],”
+
* Ross Anderson, “[http://www.cl.cam.ac.uk/ftp/users/rja14/wcf.pdf Why Cryptosystems Fail],” Communications of the ACM 37(11), November 1994.
  Proc. USENIX Security Symposium, August 1999.
 
Ross Anderson, “[http://www.cl.cam.ac.uk/ftp/users/rja14/wcf.pdf Why Cryptosystems Fail],” Communications of the ACM 37(11), November
 
  1994.
 
  
 
==Discussion==
 
==Discussion==
 
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_6 wiki-discussion].
 
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_6 wiki-discussion].

Latest revision as of 04:32, 6 October 2005

Computer Security Primer

Speakers

Geoff Voelker, UCSD

Readings

Discussion

Participate in the wiki-discussion.