|
|
|
This is the Zoom review session held on Thursday June 2, 2022.
|
|
|
|
This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of May 17. The video begins at 3:02 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of May 17. The video begins at 1:47 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers attacks, authenticated encryption, networks and cryptography, and TLS security. The video begins at 4:09 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers key exchange, generation, and PKIs The video begins at 10:16 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers digital signatures and symmetric key exchange.. The video begins at 5:08 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of April 19. The video begins at 10:26 from the beginning.
|
|
Foundations of Computer and Information Security. This covers the beginnings of noninterference. The class starts at 6:41 into the video.
|
|
Foundations of Computer and Information Security. This covers the Clark-Wilson model and trust models. The class starts at 2:28 into the video. The reference to power comes from parts of Davis…
|
|
|
|
UC Davis Emeriti Association Video Records Project Panel featuring Alex McCalla, Michael Reid, Verne Mendel, John Goss, Bob Leighton, and Bill Breidenbach
|