Lectures
|
Anonymity and Surveillance
Type |
Lecture |
Nr. |
M+I807 |
Hours per week |
2.0 |
Content |
- communication in networks when internal and external attackers are present
- definition and usage of the terms anonymity, non-linkability and unobservability
- concepts of distinguishability, concatenation and pseudonymity
- privacy with different protection levels of communication data
- legal framework of anonymity and data protection in the Internet
- anonymization technologies, overlay networks
- anonymizer, digital mixing according to Chaum, Java Anon Proxy (JAP) / JonDo
- TOR networks and hidden services
- threat models, mechanisms for protecting private network communication
- self-protection in social networks, Deep Web und crime
- remailer-systems and OTR-technologies
- techniques for identifying users on the web
- impact of anonymous Internet usage
|
Literature |
- selected publications of IEEE & ACM DLs
- Jens Kubieziel, Anonym im Netz – Wie Sie sich und Ihre Daten schützen. Open Source Press; 3. Auflage, 2012.
- Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier and Srinivas Devadas, Circuit fingerprinting attacks: Passive deanonymization of tor hidden services. In Proceedings of the 24th USENIX Security Symposium, 2015.
|
Multimedia Databases
Type |
Lecture |
Nr. |
M+I504 |
Hours per week |
2.0 |
Content |
- Goals and principles of Multimedia Databases
- Meta Data, Features, Segmentation, Query Types, Similarity
- Image Databases, Content Based Retrieval, Semantic Gap, Deep Learning, Data Structures, Images in Oracle
- Audio Databases, Music Retrieval, Shazam, Audio in Oracle
- Video Databases, Video Features, Data Structures, Netflix, Video in Oracle
- Text Databases
- All Types of Media in one Database
|
Next Generation Internet
Type |
Lecture |
Nr. |
M+I408 |
Hours per week |
2.0 |
Content |
Internet Architecture (principles and critical discussion of changes)
IPv6
Content Distribution in the Internet (CDNs, P2P systems, Information Centric Networking)
Multimedia communication (new transport protocols, congestion control, quality-of-service
|
Literature |
- J. F. Kurose, K. W. Ross: Computer Networking -- A Top-down Approach Featuring the Internet. Pearson, 2013.
- additional articles and books are presented in the lecture
|
|