Seminar on Internet Technologies (Summer 2010): Difference between revisions
| (3 intermediate revisions by 2 users not shown) | |||
| Line 10: | Line 10: | ||
{{Announcement|The seminar is ongoing but '''you can still take part'''. If you are interested in a topic please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information.}} | {{Announcement|The seminar is ongoing but '''you can still take part'''. If you are interested in a topic please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information.}} | ||
==Course description== | ==Course description== | ||
| Line 26: | Line 27: | ||
==Schedule== | ==Schedule== | ||
* Thursday, '''8 April 2010, 16.15 - 17.15''': First general meeting. Introduction to the course and open questions. | * <strike>Thursday, '''8 April 2010, 16.15 - 17.15''': First general meeting. Introduction to the course and open questions.</strike> | ||
* Tuesday, '''1 June 2010, 14.00 - 16.15''': Presentations. | |||
** 14.00 - 14.45: Twitter: a popular microblogging tool | |||
** 14.45 - 15.30: User behavior in Online Social Networks | |||
** 15.30 - 16.15: Security threats of Online Social Networks | |||
* Thursday, '''30 September 2010''': Deadline for turning in the reports. | |||
== Topics == | == Topics == | ||
| Line 61: | Line 67: | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx] | | [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx] | ||
|- | |||
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa) | |||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | |||
| [http://avispa-project.org/] | |||
|- | |- | ||
| Distributed Hash Tables - Usage, properties and future development | | Distributed Hash Tables - Usage, properties and future development | ||
| Line 78: | Line 88: | ||
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf] | | [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf] | ||
|- | |- | ||
| Security threats of Online Social Networks | | <strike>Security threats of Online Social Networks</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] | | [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] | ||
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf] | | [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf] | ||