WiSe 20/21: Seminar: IT-Security
Volker Roth
Additional information / Pre-requisites
Students are expected to:
Give a technical presentation of their assigned topics; Demonstrate research software prototypes whenever applicable; Turn in a short technical report on their assigned topics (10 pages).
Students will be graded on their preparedness for discussion, their presentations and their seminar report. The report must be typeset in LaTeX. Both the LaTeX source and the PDF generated from it must be submitted as a TAR or ZIP archive. A LaTeX template is here.
The seminar report must contain references to all the articles that were used. Each literature entry must include a brief and concise summary of the article's contribution and the contribution's benefits. Please use the BibTex "note" field for this purpose and inline the bibliography by including the bbl file into the LaTeX source.
closeComments
Suggested reading
- Anderson, Ross. "Why cryptosystems fail." In Proc. ACM Conference on Computer and Communications Security (CCS), pp. 215-227. ACM, 1993.
- Whitten, Alma, and J. Doug Tygar. "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0." In Usenix Security, vol. 1999. 1999.
- Artikel aus den Tagungsbänder der Konferenzen CHI, SOUPS, ACSAC.
15 Class schedule
Regular appointments
This Seminar will address IT-Security subjects.
Details and description to be added soon.