- April 19th : Cryptography (1) by Jeroen Doumen
A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone.
Handbook of Applied Cryptography,
(CRC Press Series on Discrete Mathematics and Its Applications)
Chapter 1: in full.
Chapter 7: paragraphs 1-3.
Chapter 8: paragraphs 1-2.
Chapter 9: paragraphs 1-3.
Book PDF and PostScript
NIST, Announcing the Advanced Encryption Standard (AES), FIPS-197.
paragraphs 1-5.
PDF
Slides on "Symmetric cryptography" Powerpoint
by Jaap-Henk Hoepman
and Jeroen Doumen
- April 26th : Cryptography (2) by Jeroen Doumen
Slides on "Asymmetric cryptography" Powerpoint
by Jaap-Henk Hoepman
and Jeroen Doumen
- May 3rd : Biometrics
A. Jain, L. Hong, S. Pankanti.
biometric identification,
Communications of the ACM, Volume 43, Issue 2 (February 2000), pp 91-98.
Paper ACM digital Library
Slides PowerPoint
N. J. Henderson and P. H. Hartel.
Pressure sequence - a novel method of protecting smart cards,
In J. Domingo-Ferrer, D. Chan, and A. Watson, editors,
4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS),
pages 241-256, Bristol, UK, Sep 2000. Kluwer Academic Publishers, Boston/Dordrecht/London.
Paper PDF
Slides PowerPoint
- May 10th : Smart Cards
K. M. Shelfer, J. D. Procaccino.
Smart Card Evolution,
Communications of the ACM, Volume 45, Issue 7 (July 2002), pp 83-88.
Paper ACM Digital Library
D. Huseman.
The smart card: don't leave home without it
IEEE Concurrency, Volume 7, Issue 2, pp 24-27 (April 1999)
Paper IEEE digital Library
Slides PowerPoint
Z. Chen.
Java Card Technology for Smart Cards,
Addison Wesley, Reading, Massachusetts, 2000
Chapters 3 and 9 HTML
Slides PowerPoint
- May 17th : Digital Rights Management
F. Hartung, F. Ramme.
Digital rights management and watermarking of multimedia content for M-commerce applications,
IEEE Communications Magazine, 38(11): 78-84, Nov. 2000
Paper IEEE digital Library
Slides PowerPoint
C. N. Chong, R. van Buuren, P. H. Hartel, and G. Kleinhuis.
Security Attribute Based Digital Rights Management.
In: Joint Int. Workshop on Interactive Distributed Multimedia Systems / Protocols for Multimedia Systems (IDMS/PROMS),
F. Boavida E. Monteiro J. Orvalho (eds.), pages 339-352, Coimbra, Portugal, LNCS 2515, Springer-Verlag, Berlin, Nov. 2002
Paper PDF
Slides PowerPoint
Payment Protocols
N. Asokan, Ph. Janson, M. Steiner, M. Waidner.
State of the art in electronic payment systems,
in: Advances in Computers, Volume 43, M. V. Zelkowitz (ed.)
pp. 425-449, Academic Press, Mar. 2000.
Paper PDF
Slides PowerPoint
- May 24th : Security protocols (1) by Ricardo Corin
J. Millen, V. Shmatikov.
Constraint solving for bounded-process cryptographic protocol analysis,
In 8th ACM Conference on Computer and Communication Security, page 166-175, ACM Press, New York
Paper ACM Digital Library
Slides on "Security Protocols" part 1 Powerpoint
by Sandro Etalle
and Ricardo Corin
- May 31st : Security protocols (2) by Ricardo Corin
R. Corin, S. Etalle.
An Improved Constraint-Based System for the Verification of Security Protocols,
In 9th Int. Symp. on Static Analysis, LNCS 2477, pages 326-341, Springer Verlag, Berlin
Paper Springer Digital Library
Slides on "Security Protocols" part 2 Powerpoint
by Sandro Etalle
and Ricardo Corin
On line demo and resources here
- June 7th : Mini conference
10:40-11:00 Holtkamp & Geerdink: Digital Rights Management, e-business delivery models in comparison
11:00-11:20 Kok & Kroese: Credit Cards as EPS: Privacy, Security & Trust
11:20-11:40 Kuiper & Trifunovic: Otoacoustic emissions
11:40-12:00 Dingjan & de Jong: Intelligent distributed public transport pricing system
12:00-12:20 Bakker & Schoemaker: Software copy protection using DRM and VM techniques
- Tue June 14th, 9:00-12:30, room WA1 Written Examination (Open book, no electronics)
Past exam papers:
- Fri August 26th, 9:00-12:30 Resit (Written Examination, Open book,
Second and last opportunity in 2005)
Past exam papers: