web-archive-net.com » NET » E » ENGINEERBLOGS.NET

Total: 180

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Computer and Network Security - Engineer Blogs
    of Paar and Pelzl s Understanding Cryptography Wikipedia on Elliptic Curves Wikipedia on Elliptic Curve Cryptography Sage is a free open source collection of mathematics programing tools based on top of Python Lecture 15 Public Key Encryption El Gamal IND CCA2 and Cramer Shoup Lecture Notes Recommended readings Paar and Pelzl Chapters 6 7 and 8 and Katz and Lindell Chapter 10 Tsiounis and Yung s paper On the security of El Gamal PK encryption Wikipedia on the Cramer Shoup PK encryption method Lecture 16 RSA Encryption and Digital Signatures Lecture Notes Dan Boneh s paper Twenty Years of Attacks on the RSA Cryptosystem Lecture 17 Digital Signatures RSA ElGamal and DSS Lecture Notes Lecture 19 Gap Groups Bilinear Maps and Secret Sharing Problem Set 5 is due May 4th Lecture Notes Pairing Based Cryptographic Protocols A Survey The Boneh Lynn Shacham BLS signature scheme Shamir s secret sharing scheme Lecture 20 Key Establishment and Certificates Lecture Notes Handbook of Applied Cryptography chapter 12 Wikipedia on Needham Schroeder Also see Protocols for Authentication and Key Establishment by Colin Boyd and Anish Mathuria Springer 2003 Lecture 21 SPKI SDSI Viruses and Trusting Trust Lecture Notes SPKI SDSI Page Certificate Chain Discovery in SPKI SDSI Wired story on the Slammer worm Quines programs that print themselves Ken Thompson s Turing Award article Reflections on Trusting Trust Lecture 22 Electronic Cash Lecture Notes How to Make a Mint The Cryptography of Anonymous Electronic Cash by Law Sabett and Solinas Untraceable Off line Cash in Wallets with Observers by Stefan Brands Bitcoin Peppercoin Computer Security School of Informatics University of Edinburgh Slides 1 Security landscape view print 2 Cryptography basics view print 3 Hash functions view print 4 Symmetric cryptography view print 5 Asymmetric cryptography view print 6 Digital signatures view print 7 Protocols I view print 8 Protocols II view print 9 Security models view print 10 Email and web security view print 11 Network and Internet vulnerabilities view print 12 Programming securely view print 13 Programming securely II view print 14 Network and Internet defences view print 15 Guest Sarah Lowman Forensics view 16 Guest Shahriar Bijani Mobile Telecoms view print 17 Guest Mike Just Usable Security view print 18 Attack landscape and summary view print Tutorial Sheet 1 Cryptography The solutions are here Tutorial Sheet 2 Protocols The solutions are here Tutorial Sheet 3 Networks Programming The solutions Text Book Cryptography and Network Security Stallings 4th edition The course will cover three areas security risks countermeasures principles of computer cryptography and applied cryptography Overview vulnerabilities risk assessment incidents forensics UNIX vulnerabilities and safeguards Hash functions MD5 SHA RIPEM Whirlpool Authentication and authorization Network security BSDisms sniffers wrappers vpns firewalls intrusion detection Kerberos trusted systems secure OS Cryptography steganography number theory random numbers Secret key encryption DES IDEA RC5 CAST AES Rijndael Public key encryption Diffie Hellman RSA ECC DSA key management PKIs OpenSSL and crypto API s writing secure software secure applications PGP S MIME ssh netscape SSL IPsec Issues legal

    Original URL path: http://www.engineerblogs.net/course-categories/computer-science-engineering/computer/computer-and-network-security/ (2016-04-27)
    Open archived version from archive

  • Network Security - Engineer Blogs
    and overview tiger team final report Lectures Notes intro to network security flaws network protocol oriented short crypto intro botnets lecture firewall lecture network security tools Intro to Snort IDS system ASCII link layer network security mini lecture 80211 diatribe start with theory txt IPSEC lecture combined ssh ssl lecture email security kerberos ourmon as an anomaly detection system the web as battleground you are what you emit tempest radiation Class handouts in ASCII various examples of Router Host ACLs open ssl benchmark examples FreeBSD manual ESP example MN FreeBSD manual ESP example server Lessons in ssh key management Text Book Charlie Kaufman Radia Perlman and Mike Speciner Network Security Private Communication in a Public World Pr entice Hall Network Security Slides Course Abstract Prerequisites COMS W3139 Data Structures and COMS W4119 Computer Networks or equivalent e g an OS course covering computer networks Fluency in C and or Java Introduction to cryptography and its application to network and operating system security security threats applications of cryptography secret key and public key cryptographic algorithms hash functions basic number theory authentication security for electronic mail and network scripting languages Introduction issues of network security Denial of service attacks Firewalls Orange book patent issues introduction to cryptography Secret key cryptography Cryptography Secret key cryptography DES Secret key cryptography IDEA CBC OFB Hashes and message digests MD2 4 5 public key algorithms public key algorithms RSA prime number generation Number theory Authentication systems Authentication systems Intrusion detection Authentication of People Security handshake pitfalls Security handshake pitfalls Kerberos V4 Kerberos 4 5 Kerberos 5 operating system vulnerabilities Operating system vulnerabilities IP security Email security PGP Pretty Good Privacy OpenPGP Web security and SSL TLS Related posts Computer and Network Security Network Programming Other Courses Important security features to incorporate while building an amusement park

    Original URL path: http://www.engineerblogs.net/course-categories/computer-science-engineering/computer/network-security/ (2016-04-27)
    Open archived version from archive

  • Operating Systems - Engineer Blogs
    and Virtual Memory CPU Scheduling File Systems and Disks Disk Scheduling Protection and Security File Systems Operating System Text Book Operating System Concepts Abraham Silberschatz and Peter Baer Galvin Addison Wesley 1999 Lecture Notes Teacher Slides Multiple Choice Questions Question Bank Module 1 Introduction to OS 3 Operating systems Application scenarios kind of resource support needed by applications what is an Operating System and what support is provided to run an application hardware and software layers organization of a computer system operational view of a computing system with resources like processor memory input and output issues in resource management a bare bone operating system introduction to the issues in communication with devices kernel and shell of an operating system processes and file Module 2 File Systems and Management 4 5 File systems What is a file user view of files file types and file operations file types in Unix and Microsoft file operation commands file access rights file storage management Inode or FAT structure file control blocks root file system directory and file paths blocks impact of block size selection contiguous allocation chained and indexed allocations Impact of allocation policy on fragmentation mapping file blocks on the disk platter cylinder disk access control and scheduling Module 3 Process Management 6 Processor resource management Explanation of processor as a resource definition of a process processor utilization multi processing and time sharing response time process state process state transitions process scheduling short term and long term schedules non pre emptive and pre emptive scheduling policies time slice policies like FCFS SJF etc Gantt charts and parameters to compare policy performance context switching of process state information Kernel architecture User and kernel mode of operation System calls process states kernel operations design of a scheduler Module 4 Memory Management 6 Motivation for memory management when and where primary and secondary memory management is needed compiled code and memory relocation linking and loading processes and primary memory management memory allocation policies critique of various policies like first fit best fit internal and external fragmentation secondary memory management fixed and variable partitions virtual memory concept paging and page replacement policies page faults thrashing hardware support for paging segmentation segmentation with paging Module 5 Input Output Management 4 5 Issues in human centric device centric and computer centric IO management input output modes programmed IO polling interrupt mode of IO various types of interrupts interrupt servicing priority interrupts interrupt vectors direct memory access DMA mode of transfer setting up DMAs device drivers interrupt handling using device drivers buffer management device scheduling disk scheduling algorithms and policies Module 6 Resource Sharing and Management 3 Shared resources resource allocation and scheduling resource graph models deadlocks deadlock detection deadlock avoidance deadlock prevention algorithms mutual exclusion semaphores wait and signal procedures Module 7 Interprocess communication 3 Spawning a new process parent and child processes assigning a task to child processes need for communication between processes modes of communication pipes shared files shared memory message based IPC signals as IPC the

    Original URL path: http://www.engineerblogs.net/course-categories/computer-science-engineering/computer/operating-systems/ (2016-04-27)
    Open archived version from archive

  • Engineer Blogs - Theory of Computing
    thesis decidability halting problem reducibility recursion theorem Complexity Theory Time and space measures hierarchy theorems complexity classes P NP PSPACE P versus NP conjecture quantifiers and games provably hard problems probabilistic computation Introduction to Theory of Computing Textbook Introduction to the Theory of Computation by Michael Sipser Lecture Notes slides Homework with solution Exam with solution Topics Induction and Strings Deterministic Finite Automata DFAs Regular Languages Non deterministic Finite Automata NFAs Equivlance of NFAs and DFAs Regular Expressions Finite Automata Regular Expressions and Non Regular Languages The Pumping Lemma Context Free Languages Pumping Lemma for CFLs Regular Language Introduction to Turing Machines Fun with Turing Machines Turing Machine Variants Decidability Universal Turing Machines and Diagonalization The Halting Problem for Turing Machines Reductions Reductions Redux Computational Histories Time Complexity P and NP The Cook Levin Theorem Cryptography More NP Completens Examples Research Advertisement Reference Related posts Applied Feedback Control Game Theory Linear circuit Theory Machine learning Leave a Reply Cancel reply Your email address will not be published Required fields are marked Comment Name Email Website Notify me of follow up comments by email Notify me of new posts by email Top Posts Pages Digital Signal processing Signals and Systems Fluid

    Original URL path: http://www.engineerblogs.net/course-categories/computer-science-engineering/theory-of-computing/ (2016-04-27)
    Open archived version from archive

  • Linear Logic - Engineer Blogs
    Linear Logic Lecture Notes Additional Reading Due Deductive Inference 00 overview pdf From Rules to Propositions Harmony Cut Reduction as Computation CPT12 pp 1 3 Choice and Replication CPT12 pp 4 8 Asst 1 Quantification CPT12 pp 8 9 Cut Elimination Identity and Inversion Chaining and Focusing Asst 2 Natural Deduction Functional Computation Asst 3 Substructural Operational Semantics Forward Chaining linlam clf Asst 4 Pi Calculus Revisited Midterm Exam Sample Solution Ordered Logic Ollibot Ordered Forward Chaining Examples Backward Chaining Resource Management CHP00 Unification Monadic Logic Programming LPPW05 Code A Concurrent Logical Framework WCPW02 CPWW02 Asst 5 Concurrent Monadic Computations Code Resource Semantics Embedding Linear Logic in Intuitionistic Logic RP10 Asst 6 Classical Linear Logic A92 CCP03 Mix and Proof Nets BvdW94 Implicit Computational Complexity H03 AS02 Asynchronous Session Types Asst 7 Final Exam 8 30 11 30am GHC 4215 Sample Solution Linear Logic Handouts Reference Related posts Digital Logic Design VHDL Tutorials Theory of Computing Digital Logic Circuits Leave a Reply Cancel reply Your email address will not be published Required fields are marked Comment Name Email Website Notify me of follow up comments by email Notify me of new posts by email Top Posts Pages Digital Signal processing

    Original URL path: http://www.engineerblogs.net/course-categories/linear-logic/ (2016-04-27)
    Open archived version from archive

  • Scientific Computing - Engineerblogs
    contain material taken directly from the copyrighted book reproduction of the lecture notes is permitted only for noncommercial educational use and only in conjunction with use of the book and the original author credit and copyright notice must be retained Chapter Full Size Reduced 1 Scientific Computing for viewing for printing 2 Systems of Linear Equations for viewing for printing 3 Linear Least Squares for viewing for printing 4 Eigenvalue Problems for viewing for printing 5 Nonlinear Equations for viewing for printing 6 Optimization for viewing for printing 7 Interpolation for viewing for printing 8 Numerical Integration and Differentiation for viewing for printing 9 Initial Value Problems for ODEs for viewing for printing 10 Boundary Value Problems for ODEs for viewing for printing 11 Partial Differential Equations for viewing for printing 12 Fast Fourier Transform for viewing for printing 13 Random Numbers and Simulation for viewing for printing Computer science engineering Related posts Problem Solving in Electrical and Computer Engineering Theory of Computing Optimal Control Leave a Reply Cancel reply Your email address will not be published Required fields are marked Comment Name Email Website Notify me of follow up comments by email Notify me of new posts by email

    Original URL path: http://www.engineerblogs.net/course-categories/scientific-computing/ (2016-04-27)
    Open archived version from archive

  • Software Engineering - Engineer Blogs
    consideration of social or human factors issues Students undertake a semester group project implemented mandatory in JAVA as a major part of the course Lectures Sections in book Num Name PPT PDF Readings Presentation of the course 4PDF 1 Introduction PPT PDF Chapter 1 2 Computer based system engineering PPT PDF Chapter 2 3 Software processes PPT PDF Chapter 3 5 Software requierements PPT PDF Chapter 5 6 Requierements engineering processes PPT PDF Chapter 6 7 System models PPT PDF Chapter 7 12 Object oriented design PPT PDF Chapter 12 14 Design with reuse PPT PDF Chapter 14 20 Software testing PPT PDF Chapter 20 23 Software cost estimation PPT PDF Chapter 23 For other Resources Practical exercises UNIX tutorial DBMS Oracle SQL tutorial JAVA tutorial Software Engineering Lectures Notes Module 1 Introduction to Software Engineering Module 2 Software Life Cycle Model Module 3 Requirements Analysis and Specification Module 4 Software Design Issues Module 5 Function Oriented Software Design Module 6 Basic Concepts in Object Orientation Module 7 Object Modeling using UML Module 8 Object Oriented Software Development Module 9 User Interface Design Module 10 Coding and Testing Module 11 Software Project Planning Module 12 Software Project Monitoring and Control Module 13 Software Reliability and Quality Management Module 14 Software Maintenance Module 15 Computer Aided Software Engineering Module 16 Software Reuse Module 17 Client Server Software Development Software Engineering Text Book Sommerville Software Engineering 8th Edition Addison Wesley Lectures Notes Discussions Course Description An introduction and exploration of concepts and issues related to large scale software systems development Areas of exploration include technical complexities organization issues and communication techniques for large scale development Students participate through teams emulating industrial development The projects cover the principal system development life cycle phases from requirements analysis to software design and to final implementation

    Original URL path: http://www.engineerblogs.net/course-categories/computer-science-engineering/computer/software-engineering/ (2016-04-27)
    Open archived version from archive

  • Modern Physics - EngineerBlogs
    State Physics Conduction and Insulation The Theory of Semiconductors Superconductivity Nuclear Physics Nucleons and Binding Nuclear Physics Models of the Nucleus and Radioactivity Fission and Fusion Particles and Interactions Forces Antiparticles and the Building Blocks of the Universe Particles and Interactions Antiparticles and Conservation Laws Introductory Physics course for physics majors Physics 252 Michael Fowler University of Virginia What is Modern Physics Modern physics means physics based on the two major breakthroughs of the early the twentieth century relativity and quantum mechanics Physics based on what was known before then Newton s laws Maxwell s equations thermodynamics is called classical physics Lecture Notes Other useful links Lectures on Gravity Lectures on Fluids Some Useful Math Lectures on Oscillations and Waves Lectures on Heat and Thermodynamics Physics 751 Graduate Quantum Mechanics Physics 1425 for Engineers Powerpoint Slides Modern Physics for Scientists and Engineers Textbook Modern Physics for Scientists and Engineers By Thornton and Rex Third Edition 2006 Answers Problems Slides Lecture Exams Answers Quiz Midterm and Study guide for the final exam and more click here Supplementary Reading Fourier series and integrals Time dependent quantum mechanics and selection rules Wave functions for identical particles antisymmetry and exchange Slides Used in Lecture Origins of QM Special Relativity General Relativity Waves Particles Fourier Analysis Quantum Mechanics Postulates 1D Problems 3D Problems 3D Tunnelling Hydrogenic Atom Many Electron Atoms Periodic Table Time Dependent Perturbation Theory Molecules the Laser Solids the Transistor etc Nuclei Particles the Future EngineerBlogs net Related posts Physics Seeing and Believing Detection Measurement and Inference in Experimental Physics Physics Complex Numbers and Ordinary Differential Equations Leave a Reply Cancel reply Your email address will not be published Required fields are marked Comment Name Email Website Notify me of follow up comments by email Notify me of new posts by email Top

    Original URL path: http://www.engineerblogs.net/course-categories/modern-physics/ (2016-04-27)
    Open archived version from archive