University of Minnesota
Security and Privacy in Computing


DateReading topicSlidesOther assignments
Tuesday 1/16Introduction and logistics8-up PDF
Thursday 1/18"Nigerian" Scammers8-up PDF
Tuesday 1/23ORAMs 18-up PDF
Thursday 1/25ORAMs 28-up PDF
Tuesday 1/30Passwords 1
Thursday 2/ 1Passwords 2
Tuesday 2/ 6Differential privacy 1
Thursday 2/ 8Differential privacy 2
Tuesday 2/13Deep network privacy 1
Thursday 2/15Deep network privacy 28-up PDF
Tuesday 2/20Voting 1
Thursday 2/22Voting 2
Tuesday 2/27Crypto proofs 18-up PDF
Thursday 2/29Crypto proofs 28-up PDF
Tuesday 3/ 5Spring break, no class
Thursday 3/ 7Spring break, no class
Tuesday 3/12Web 1
Thursday 3/14Web 2
Tuesday 3/19Cryptocurrencies 1
Thursday 3/21Cryptocurrencies 2
Friday 3/22Project proposal
Tuesday 3/26CPU architecture 1
Thursday 3/28CPU architecture 2
Tuesday 4/2Adversarial ML 1
Thursday 4/4Adversarial ML 2
Tuesday 4/9Fuzzing
Thursday 4/11Relationships
Friday 4/12Project interim report
Tuesday 4/16Software supply chains
Thursday 4/18Network anonymity
Tuesday 4/23Project presentations
Thursday 4/25Project presentations
Monday 4/29Project final report

The reading schedule is structured in one-week units, each with two main papers. Here are some potential topics which we may not get to all of: