Search for tag: "bits"

ECS 235A Fall Quarter 2021, Lecture 9, October 11, 2021

This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.

From  Matt Bishop 0 likes 13 plays 0  

ECS 235A Fall Quarter 2021, Lecture 8, October 8, 2021

This is the video of the eighth lecture. It's crude as I made it from my laptop, as the room has no video recording. We moved to a different room.

From  Matt Bishop 0 likes 21 plays 0  

ECS 235A Fall Quarter 2021, Lecture 7, October 6, 2021

This is the video of the seventh lecture. It's crude as I made it from my laptop, as the room has no video recording. I'm sure it is really very amateurish.

From  Matt Bishop 0 likes 21 plays 0  

How Does a Quantum Computer Work?

from Veritasiumhttps://www.youtube.com/watch?v=g_IaVepNDT4

From  John Terning 0 likes 10 plays 0  

ECS 153, Spring 2021; Lecture #27; May 28, 2021

ECS 153 Spring 2021. Computer Security. This covers more on malware. The video begins at 2:57 from the beginning.

From  Matt Bishop 0 likes 32 plays 0  

ECS 153, Spring 2021; Lecture #24; May 21, 2021

ECS 153 Spring 2021. Computer Security. This covers ACLs, C-Lists, locks and keys, secret sharing, and begins rings. The video begins at 1:42 from the beginning.

From  Matt Bishop 0 likes 58 plays 0  

ECS 153, Spring 2021; Lecture #23; May 19, 2021

ECS 153 Spring 2021. Computer Security. This covers authentication with a brief overview of rainbow tables and begins access control mechanisms. The video begins at 5:13 from the beginning.

From  Matt Bishop 0 likes 42 plays 0  

ECS 153, Spring 2021; Lecture #21; May 14, 2021

ECS 153 Spring 2021. Computer Security. This covers attacks, authenticated encryption, networks and cryptography, and TLS security. The video begins at 4:09 from the beginning.

From  Matt Bishop 0 likes 22 plays 0  

ECS 153, Spring 2021; Lecture #17; May 5, 2021

ECS 153 Spring 2021. Computer Security. This covers symmetric key cryptography. The video begins at 7:00 from the beginning.

From  Matt Bishop 0 likes 48 plays 0  

ECS 153, Spring 2021; Lecture #18; May 7, 2021

ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.

From  Matt Bishop 0 likes 77 plays 0  

ECS 289A Lecture 3b

From  David Doty 0 likes 10 plays 0  

ECS 289A Lecture 1b

From  David Doty 0 likes 18 plays 0  

ECS 220 9a:1-8.6 IP=PSPACE (no proof)

From  David Doty 0 likes 11 plays 0  

ECS 220 8c:8.6-2 PSPACE-completeness

From  David Doty 0 likes 15 plays 0  

ECS 220 8c:8.4 Savitch's theorem space-bounded deterministic simulation of space-bounded nondeterminism, space usage of Savitch_s algorithm

From  David Doty 0 likes 15 plays 0  

ECS 220 8b:8.3-2 NL-WitnessExistence and Reachability are NL-complete

From  David Doty 0 likes 14 plays 0