Summer 2006
Tue. 12:30-14:00, b-it, 1.25
Wed. 17:30-19:00, b-it, 1.25
Tue. 10:00-11:30, b-it, 1.25 (Tutorial)
First meeting: Tuesday, 2006 April 4th, 12:30.
Wed. 17:30-19:00, b-it, 1.25
Tue. 10:00-11:30, b-it, 1.25 (Tutorial)
First meeting: Tuesday, 2006 April 4th, 12:30.
Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures ...
We 13:15 - 14:45, Marschallsaal,
Start(Organizational): 5.4.2006
Start(Organizational): 5.4.2006
Seminar Digital Rights Management
Prof. Dr. Joachim von zur GathenDigital Right Managements (DRM) is the set of rules and techniques which help the producers of digital media to make sure that their products can be enjoyed by consumers but that intellectual property rights are being aspected. Currently DRM is concerned with actions like copy protection, licensing, tracking the frequency of use. The seminar deals with, but is not limited to the following ...
27 April 2006 - 15 August 2006
Oberseminar Computer Security
Prof. Joachim von zur Gathen
The seminar discusses subjects of current interest in computer security. Some of the lectures will be given by invited guests.
Thursday, 12:15 - 13:45, b-it-max.
Tutorial: Thursday, 09:00 - 10:30,
b-it, Cafeteria (or Marschallsaal).
(First tutorial on April 20th!)
Tutorial: Thursday, 09:00 - 10:30,
b-it, Cafeteria (or Marschallsaal).
(First tutorial on April 20th!)
Security on the Internet
Michael Nüsken
This course is about various aspects of security in the internet.
- Who can read my email?
- How do I know that eBay is eBay, or amazon is amazon?
- What is the public key of Angela Merkel? Where do I get it and how do I verify that it's really hers?
- ...