1. This is lecture 2 of the computer security module 2012 at the University of Birmingham. It covers symmetric Key encryption and block cipher modes.

    # vimeo.com/50255577 Uploaded 89 Plays 0 Comments
  2. In this lecture we looked at some security protocols, including

    o Alice and Bob notation
    o Needham-Schroeder Public Key Protocol
    o TLS/SSL

    # vimeo.com/51920740 Uploaded 270 Plays 0 Comments
  3. Description of PKCS7 from Lecture 4 of the computer security module, Univ. of Birmingham 2012. The rest of the lecture involved a demo of encryption and keystore in Java, which was not record.

    # vimeo.com/50881510 Uploaded 68 Plays 0 Comments
  4. A description of hash functions and attacks on hashes.

    # vimeo.com/51593250 Uploaded 46 Plays 0 Comments
  5. First 16mins of Lecture 5, covering different access control models.

    # vimeo.com/50992826 Uploaded 51 Plays 0 Comments

Computer Security 2012 University of Birmingham

Tom Chothia

Lectures from the 2012 Computer Security Module at the University of Birmingham

Browse This Channel

Shout Box

Heads up: the shoutbox will be retiring soon. It’s tired of working, and can’t wait to relax. You can still send a message to the channel owner, though!

Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.