Veranstaltung: Private and Anonymous Communication
- Vorlesung und Übungen
- rechnerbasierte Präsentation
- Prof. Dr. Christina Pöpper
- Prof. Dr. Christina Pöpper (ETIT)
- Angeboten im:
The students are able to describe, classify, and assess techniques for private and anonymous communication. They are able to reason about the motivation for using these techniques and can describe different scenarios and applications. They are able to describe, classify, and (to a certain extent) counter attacks on privacy and anonymity. The students understand the architectures of different tools, approaches, and techniques that have been proposed and developed in this context. They are able to reason about the achieved levels of protection and also gain practical experience with different tools.
The focus of this course are privacy-enhancing technologies and anonymity techniques. Central elements are privacy metrics and techniques, vulnerabilities and attack mechanisms as well as detection, protection, and prevention techniques. The course will cover techniques for anonymous communication and browsing (e.g., Tor), anonymity in electronic payment systems (e.g., E-Cash, Bitcoin), steganographic and censorship circumvention techniques, communication hiding, and location privacy. The course may also cover special topics such as electronic voting or privacy in social networks.
Knowledge of the contents of Netzsicherheit and Computernetze as well as expertise in programming will be beneficial.
The exercises cover reports, hands-on parts, programming as well as paper work with research papers.