Basic Concepts of Computation (UH 2016)
Security and Trust I (UH 2018)
Data Security and Cryptograpny (UH 2015)
- Lecture 1: Introduction
- Lecture 2: Classical cryptography
- Lecture 3: Information theoretic cryptography
- Lecture 4: Symmetric key cryptography
- Lecture 5: Public key cryptography
- Lecture 6: Overview
Economics and Security (RHUL 2013, UH 2014)
- Lecture 1: Introduction
- Part I, Lecture 2: Security investment analysis
- Part I, Lecture 3: Interdependencies of security investments
- Part II, Lecture 4: Basic ideas about market
- Part II, Lecture 5: Market with intermediaries and advertising
- Part II, Lecture 6: Network effects and self-fulfilling claims
- Part II, Lecture 7: Towards information security of market
- Part II, Lecture 8: Social welfare and social choice
- Lecture 9: Overview
- Lecture 10: Review
Computability and Complexity (RHUL 2012)
- Part 1: Motivation
- Part 2: Computability
- Part 3: Feasibility
- Part 4: Randomization
- Part 5: Interactions and protocols
- Part 6: Algorithmic information
Principles of Security (Oxford 2008-10)
- Part 1: Introduction
- Part 2: Resource security
- Part 3: Information security and cryptography
- Part 4: Authentication
- Part 5: Pervasive security