... and the book chapter for each. You can also find useful material in most textbooks
on information security (looking up a keyword in a textbook's index tells you where
it is covered in the book). An online search often comes up with surprisingly useful
online information on a topic, as does the use of wikipedia, etc.
Lectures are Tues and Thur 4:30-5:45pm in HAAS G066
Instructor Office Hours: At the end of the class (walk up to the instructor at the end of the lecture)
... or by appointment.
TA web site (for messages from TA and project info)
* Final exam is May 4 (Saturday) - 1:00pm-3:00pm in WTHR 320
* When sending me email please include "CS426" in the subject ...
... to guarantee priority processing of your email; I am flooded with non-spam email every day,
most of which is slow-processed unless it includes something that makes me treat it with priority
(like "CS426" in the subject, or email from someone with whom I collaborate, etc).
I generally prefer to answer questions about the class in person, either during my office
hours or in the classroom, because the communication bandwidth is better than email.
* Homeworks (PDF):
Hwk 1 solution
Hwk 2 solution
Hwk 3 solution
Hwk 4 solution
Hwk 5 solution
* Copies of slides used in lectures (PDF):
Note that some slides contain suggestions for further reading (in addition to the book)
Email question received: "is traffic between 2 successive Tor relays encrypted on top of the
Tor client's encryption?" to which the answer is yes, TLS encryption is used for all such links
* Additional reading assignments:
... on topics dicussed in class but that are not in the above slides