projects techreports press lab location staff
citi top.2 top.3
citi mid.3
bot.1 bot.2 bot.3

EECS 498-7/8 Computer Security: Resources


Butler Lampson, Protection

Butler Lampson, Computer Security in the Real World

Ross Anderson, Why cryptosystems fail

Roger M. Needham, Denial of service

Roger M. Needham, Denial of service: an example

Edward Wobber, Mart€n Abadi, Michael Burrows, Butler Lampson, Authentication in the Taos operating system

Butler Lampson, Mart€n Abadi, Michael Burrows, Edward Wobber, Authentication in distributed systems: theory and practice

M. Bishop and M. Dilger, Checking for Race Conditions in File Accesses, Computing Systems 9(2), pp. 131-152 (Spring 1996)


AES proposal
Rijmen's Rijndael page
Savard's description


Niels Provos' overheads

Study aids

W01 midterm exam
Lecture notes covered on midterm projects | techreports | press | lab | location | staff Email address
or call +1 734 763 2929
Copyright © 1996-2013
The Regents of the University of Michigan