1. This is lecture 2 of the computer security module 2012 at the University of Birmingham. It covers symmetric Key encryption and block cipher modes.

    # vimeo.com/50255577 Uploaded 71 Plays / / 0 Comments Watch in Couch Mode
  2. In this lecture we looked at some security protocols, including

    o Alice and Bob notation
    o Needham-Schroeder Public Key Protocol
    o TLS/SSL

    # vimeo.com/51920740 Uploaded 146 Plays / / 0 Comments Watch in Couch Mode
  3. Description of PKCS7 from Lecture 4 of the computer security module, Univ. of Birmingham 2012. The rest of the lecture involved a demo of encryption and keystore in Java, which was not record.

    # vimeo.com/50881510 Uploaded 47 Plays / / 0 Comments Watch in Couch Mode
  4. A description of hash functions and attacks on hashes.

    # vimeo.com/51593250 Uploaded 44 Plays / / 0 Comments Watch in Couch Mode
  5. First 16mins of Lecture 5, covering different access control models.

    # vimeo.com/50992826 Uploaded 46 Plays / / 0 Comments Watch in Couch Mode

Computer Security 2012 University of Birmingham

Tom Chothia

Lectures from the 2012 Computer Security Module at the University of Birmingham

Browse This Channel

Shout Box

Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels. Channels