Course Staff

Instructor: S. Nagaraja
Email: nagaraja
Phone:
Office: 3rd Floor, IIIT Delhi
Hours: Tuesdays 4-5 pm
Lectures: 26
Location: Classroom2
Credits: 4
Mailing list: cse549@iiitd.ac.in

The newsgroup is for questions/discussion on homeworks and programming assignments. But do not post solutions (code or write-up) to the newsgroup! Use email only when you cannot use the newsgroup, e.g., for urgent/personal questions.

Privacy Enhancing Technologies CSE 549

Winter 2010

Course Essentials

Pre-requisites

A basic network programming course is a prerequisite. An equivalent course in Operating Systems or Networking is also acceptable with the approval of the instructor. Knowledge of prior security courses is desirable but not essential.

Goals (post-condition)

A student scoring an 'A' grade in this course will be able to engineer practical privacy enhancing technologies, critically review existing designs, read and understand technical papers in the area of anonymous communications, privacy preserving technologies, private social networks and learn to apply the privacy-by-design methodology.

Schedule

Topic Reading/Slides
L1 Course introduction
L2 Introduction to PETS Privacy-enhancing Technologies for the Internet
I. Goldberg, D. Wagner, E. Brewer, IEEE Spring COMPCON, 1997.
L3 Introduction to PETS Privacy-enhancing technologies for the Internet II: Five years later
I. Goldberg, PET 2002.
L4 Anonymous communications Untraceable electronic mail, return addresses, and digital pseudonyms
D. Chaum, Communications of the ACM, 1981.
L5 Anonymous communications Mixminion: Design of a Type III Anonymous Remailer Protocol
G.Danezis, R.Dingledine, N.Mathewson, IEEE SSP (Oakland) 2003.
L6 Anonymous communications Towards an Analysis of Onion Routing Security
P.Syverson, G.Tsudik, M.Reed, C.Landwehr, PET 2000.
L7 Anonymous communications Tor: The Second-Generation Onion Router
R.Dingledine, N.Mathewson, P.Syverson, USENIX Security, 2004.
L8 Censorship resistance and anonymous publishing The Eternity Service
R.Anderson, Pragocrypt 1996.
L9 Censorship resistance and anonymous publishing Freenet: A Distributed Anonymous Information Storage and Retrieval System
I.Clarke, O.Sandberg, B.Wiley, T.W. Hong, PET 2000.
L10 Censorship resistance and anonymous publishing Tangler: a censorship-resistant publishing system based on document entanglements
M.Waldman, D.Mazíeres, ACM CCS 2001.
L11 Traffic analysis Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
A.Back, U.Möller, A.Stiglic, IH 2001.
L12 Traffic analysis The Traffic Analysis of Continuous-Time Mixes
G.Danezis, PET 2004.
L13 Traffic analysis Low-Cost Traffic Analysis of Tor
S.J. Murdoch, G.Danezis, IEEE SSP (Oakland) 2005.
L14 Traffic analysis Low-Cost Traffic Analysis of Tor
S.J. Murdoch, P. Zielinski, PETS 2007.
L15 Privacy and social networks Persona: An Online Social Network with User-Defined Privacy
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, D. Starin, ACM SIGCOMM 2009
L16 Privacy and social networks
L17 Privacy and social networks
L18 Privacy preserving computation
L19 Privacy preserving computation
L20 Privacy preserving computation
L21 Policy and Economics
L22 Policy and Economics
L23 Privacy-by-design
L24 Privacy-by-design
L25 Revision
L26 Revision


Plagiarism notice: please note that homework efforts are individual efforts i.e. not group efforts and not copied off the Internet. Consult the institute's plagiarism policy for more information. Please note that a first offence is punishable with a 10% reduction in grade and a second offense will result in an 'F' grade. Any plagirism offenses during examinations will swiftly result in an 'F' grade and a plagiarism record.