Course Notes

Notes are mainly based on pages of the text plus some added examples and comments. The notes are in PDF file format. You may download a free copy of Adobe Reader to read PDF files.

Lecture #10, Key Management (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_10_key_manage_DH.pdf)

Lecture #11, Authentification (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_11_authen_MAC.pdf)

Lecture #12, Hash Algorithms (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_12_hash.pdf)

Lecture #13, Digital SIgnatures (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_13_digital_signature.pdf)

Lecture #14, Network Intrusions (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_14_Attacks.pdf)

Lecture #15, Authetication Applications/Email Security (Chapters 14/15 of the text), lecture notes by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW, avaialble at ftp://ftp.prenhall.com/pub/esm/computer_science.s-041/stallings/Slides/Crypto4e-PPT-slides/ (select ch14.ppt and ch15.ppt)

Lecture #15-1, IDS (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_15_IDS.pdf)

Lecture #16, Network Intrusions (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_16_Attacks.pdf)

Lecture #17, Malicious Code (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_17_SW_malcode.pdf)