|
ECS-036A Lecture 2023-05-19 at 13:07
|
|
ECS-235A, Lecture 23, November 14, 2022
|
|
ECS-235A, Lecture 13, October 19, 2022
|
|
Abstract: Classical Internet employs buffering, switching, and routing functionality to send information over thousands of kilometers of under-sea fiber-optical cables, while exposing the data to…
|
|
Abstract — This paper presents a novel 145-185 GHz transceiver (TRX) with 4 frequency-shift keying (4FSK) modulation. The proposed non-coherent 4FSK design removes the need for separate…
|
|
Injective, surjective, and bijective functions. Examples. Two methods to shuffle cards. Countably infinite sets.
|
|
This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.
|
|
This is the video of the eighth lecture. It's crude as I made it from my laptop, as the room has no video recording. We moved to a different room.
|
|
This is the video of the seventh lecture. It's crude as I made it from my laptop, as the room has no video recording. I'm sure it is really very amateurish.
|
|
ECS 153 Spring 2021. Computer Security. This covers more on malware. The video begins at 2:57 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers ACLs, C-Lists, locks and keys, secret sharing, and begins rings. The video begins at 1:42 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers authentication with a brief overview of rainbow tables and begins access control mechanisms. The video begins at 5:13 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers attacks, authenticated encryption, networks and cryptography, and TLS security. The video begins at 4:09 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers symmetric key cryptography. The video begins at 7:00 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.
|
|
|