Search for tag: "encryption"
ECS 235A Fall Quarter 2021, Lecture 9, October 11, 2021This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.
From Matthew Bishop
0 likes
18 plays
0
|
|
ECS 235A Fall Quarter 2021, Lecture 8, October 8, 2021This is the video of the eighth lecture. It's crude as I made it from my laptop, as the room has no video recording. We moved to a different room.
From Matthew Bishop
0 likes
27 plays
0
|
|
ECS 153, Spring 2021; Discussion Section #8; May 25, 2021ECS 153 Spring 2021. Computer Security. This is the section discussion section of the week of May 24. The video begins at 3:29 from the beginning.
From Matthew Bishop
0 likes
11 plays
0
|
|
ECS 153, Spring 2021; Discussion Section #7; May 19, 2021ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of May 17. The video begins at 3:02 from the beginning.
From Matthew Bishop
0 likes
5 plays
0
|
|
ECS 153, Spring 2021; Discussion Section #7; May 17, 2021ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of May 17. The video begins at 1:47 from the beginning.
From Matthew Bishop
0 likes
7 plays
0
|
|
ECS 153, Spring 2021; Lecture #21; May 14, 2021ECS 153 Spring 2021. Computer Security. This covers attacks, authenticated encryption, networks and cryptography, and TLS security. The video begins at 4:09 from the beginning.
From Matthew Bishop
0 likes
33 plays
0
|
|
ECS 153, Spring 2021; Lecture #18; May 7, 2021ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.
From Matthew Bishop
0 likes
97 plays
0
|
|
ECS 153, Spring 2021; Discussion Section #3; April 19, 2021ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of April 19. The video begins at 5:10 from the beginning.
From Matthew Bishop
0 likes
10 plays
0
|
|