See last page.
| Date | Lecture | Topic covered | Speaker |
| 9/17 | 1 | Cryptography | Tygar |
| 9/24 | 2 | Cryptography | Tygar |
| 10/1 | 3 | Cryptography | Tygar |
| 10/8 | 4 | Authentication | |
| Intro [AN95a] | Wing | ||
| Flaws | Butler | ||
| 10/15 | 5 | Formal Methods (Logics) | |
| Intro [RH93], BAN[BAN89] | Wing | ||
| BAN variants and controversy | Hu, Song, and Tew | ||
| 10/20 (M 1:30-3:00) | 6 | Formal Methods (Models) | Wing |
| [DY89, AT91, HT96, WL93] | |||
| 10/22 (till 3:00) | 7 | Design Issues | |
| Design Principles | Berezin and Myers | ||
| Usability | Whitten | ||
| 10/29 | 8 | Formal Methods (Tools) | |
| Intro | Wing | ||
| Model Checking | Marrero and Sweitzer | ||
| Theorem Proving | Dreyer and Kindred | ||
| 11/5 | 9 | Electronic Commerce | |
| Watermarking | Ruanaidh (guest lecturer) | ||
| Intro to EC | Tygar | ||
| 11/12 | 10 | Electronic Commerce | |
| Anonymous cash | Wang and Yu | ||
| Electronic voting | Dubois-Ferriere and He | ||
| Electronic auctions | Harkavy and Kikuchi | ||
| Watermarking and Rights management | Perrig and Willmott | ||
| 11/17 (M 1:00-3:30) | 11 | Advanced Crypto Topics | |
| Elliptic curve crypt. | Uther | ||
| Lattice crypt. | Rapkin | ||
| Differential cryptanalysis. | Laurens | ||
| 11/19 | 12 | Advanced Security Topics | |
| Trust management | Halldorsson and Thorsteinsson | ||
| Key escrow | Lim and Timourian | ||
| Code-level security (SFI, PCC, etc.) | Bijansky, Ichimaru, and Lozev | ||
| Code-level security (Java JDK, etc.) | Chan and Chu | ||
| 11/27 | Thanksgiving | ||
| 12/3 | No Class | ||
| 12/6 | Project Write-ups Due |