Seminar Secure Internet Protocols
Corresponding entry in Aachen Campus, Bonn University.
Lecture
Prof. Dr. Joachim von zur Gathen, Konstantin Ziegler
Time & Place
- Monday, 1630-1800 , b-it 2.1
First meeting (organizational): Monday, 20 April 2009
Announcement: On 22 June, the seminar takes place in the b-it cafeteria.
If you are interested in the seminar, please write an email to Konstantin Ziegler containing the keyword "Seminar Secure Internet Protocols" in the subject.
Allocation
2 SWS, 4 credits
- Media Informatics, Computer and Communication Technology.
- University of Bonn - Computer Science, A.
- University of Bonn - Mathematics.
Credit Requirements
- Meet with the tutor two weeks before the date of your presentation.
- A further mandatory meeting may be scheduled.
- Give your presentation.
- Submit a report in pdf-format on the day of your presentation.
- Attend all but at most two sessions.
Contents
This seminar discusses various topics from applied and theoretical computer security. Possible areas cover security on the internet, electronic elections, encryption standards, stream ciphers, and hash functions. If you are particularly interested in a certain subject you are invited to propose it.
Schedule
- 4 May 2009: no session
- 11 May 2009: Paul Heckmann, The SSH protocoll
- Literature:
- Dan Barrett, Richard Silverman, & Robert Byrnes: SSH: The Secure Shell The Definitive Guide, Chapter Protocols.
- Literature:
- 18 May 2009: Wolfgang van Laack, Security of bluetooth
- Literature:
- Morrow, "Bluetooth: Operation and Use", Chapter 9, ISBN 0-07-138779-X.
- Christian Gehrmann, "Bluetooth Security White Paper" (pdf)
- Literature:
- 25 May 2009: Michael Stratman, Security flaws of the WEP protocol
Literature - 1 June 2009: no session
- 8 June 2009: Diana, Identity based cryptography
- 15 June 2009: Michel Kangro, Email spam filtering
- 22 June 2009: Percin Percinel, Security aspects of online banking
- 29 June 2009: Thomas Barabosch, Conficker
- 06 July 2009: Stefan Wagner, MD5 and the hash crisis
- 13 July 2009: Mohammad Abdallah, Intrusion detection
- 20 July 2009: Mohamed Souiai, Rootkits
- fun to read: Clifford Stoll, The Cuckoo's Egg, Pocket.