![Logo](http://crypto.stanford.edu/images/seclab-128.png)
Course Syllabus
Spring 2011
Lecture 1:
3/29/10
|
Overview of the Tor system
Reading:
|
Lecture 2:
3/31/10
|
Tor's bridge design
Reading:
|
Lecture 3:
4/ 5/10
|
Testing for blocked keywords
Reading:
|
Lecture 4:
4/ 7/10
|
Blocking misbehaving users in an anonymity network
Reading:
|
Lecture 5:
4/12/10
|
Applying traffic analysis to Tor
Reading:
|
Lecture 6:
4/14/10
|
Andrew Bortz
|
Lecture 7:
4/19/10
|
Roger Dingledine (guest lecture)
|
Lecture 8:
4/21/10
|
David Fifield
Reading:
|
Lecture 9:
4/26/10
|
Seminar, Cynthia Sturton
|
Lecture 10:
4/28/10
|
Ananth: evading blocking with stego
Reading:
|
Lecture 11:
5/ 3/10
|
Mike Perry: TorButton (guest lecture)
|
Lecture 12:
5/ 5/10
|
Tor hidden services
Reading:
|
Lecture 13:
5/10/10
|
P2P anonymous communication: Crowds, Salsa, Halo, ShadowWalker
|
Lecture 14:
5/12/10
|
Anonymous micropayments: anonymously paying for Tor service
|
Lecture 15:
5/17/10
|
Content injection attacks on Tor
Reading:
|
Lecture 16:
5/19/10
|
A new approach to secure randezvous
|
Lecture 17:
5/24/10
|
A review of course projects: demo session
|