User Tools

Site Tools


teaching_activities

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
teaching_activities [2019/03/13 16:49]
fabio.massacci@unitn.it [Advanced and Eligible Courses]
teaching_activities [2021/01/29 10:58] (current)
Line 46: Line 46:
  
 ^Title ^Credits ^Year ^Semester ^Lecturer ^Brief Info^ ^Title ^Credits ^Year ^Semester ^Lecturer ^Brief Info^
-|[[http://​disi.unitn.it/​~passerini/​teaching/​2016-2017/​MachineLearning/​|Machine Learning]]|6ECTS| 1,2 | 1 | Andrea Passerini | An introductory course in Machine Learning. SandP students will conclude the course with a project on Intrusion Detection. Recommended to those who wants to continue with Cyber Data Analytics in Twente.|+|[[http://​disi.unitn.it/​~passerini/​teaching/​2018-2019/​MachineLearning/​|Machine Learning]]|6ECTS| 1,2 | 1 | Andrea Passerini | An introductory course in Machine Learning. SandP students will conclude the course with a project on Intrusion Detection. Recommended to those who wants to continue with Cyber Data Analytics in Twente.|
 |{{https://​www.esse3.unitn.it/​Guide/​StampaContenutiCorso.do?​AD_ID=92750|Multimedia Data Security}}|6ECTS| 1,2 | 1 | Giulia Boato|This optional course is specifically devoted to DRM, digital watermarking and digital forensics. (You need to log in with UNITN credential to see the material)| |{{https://​www.esse3.unitn.it/​Guide/​StampaContenutiCorso.do?​AD_ID=92750|Multimedia Data Security}}|6ECTS| 1,2 | 1 | Giulia Boato|This optional course is specifically devoted to DRM, digital watermarking and digital forensics. (You need to log in with UNITN credential to see the material)|
 |[[http://​disi.unitn.it/​~zunino/​teaching/​formalTechniques/​|Formal Techniques for Crypto Protocol Analysis]]|6ECTS| 1,2 | 2 | Roberto Zunino | This optional course introduce formal methods for security using the Coq proof assistant.| |[[http://​disi.unitn.it/​~zunino/​teaching/​formalTechniques/​|Formal Techniques for Crypto Protocol Analysis]]|6ECTS| 1,2 | 2 | Roberto Zunino | This optional course introduce formal methods for security using the Coq proof assistant.|
Line 52: Line 52:
 |Finite Fields and Symmetric Cryptography|6ECTS| 1,2 | 2 | Massimiliano Sala | An advanced course on Cryptography (follow-up course on Cryptography)| |Finite Fields and Symmetric Cryptography|6ECTS| 1,2 | 2 | Massimiliano Sala | An advanced course on Cryptography (follow-up course on Cryptography)|
 |[[http://​cricca.disi.unitn.it/​montresor/​teaching/​ds2/​|Distributed Systems 2]]|6ECTS| 1,2 | 1 | Alberto Montresor | An advanced course on Distributed Systems (Byzantine Failures, blockchains)| |[[http://​cricca.disi.unitn.it/​montresor/​teaching/​ds2/​|Distributed Systems 2]]|6ECTS| 1,2 | 1 | Alberto Montresor | An advanced course on Distributed Systems (Byzantine Failures, blockchains)|
-|[[Complexity, ​Cryptography and Financial Technology]]|12ECTS| 2 | 1 | Fabio Massacci, Chan Nam Ngo | An advanced course on modern crypto-based Financial Technology (currencies,​ virtual markets) and their foundations,​ in cooperation with INNOPAY NL|+|[[Cryptography and Financial Technology]]|6ECTS| 2 | 1 | Fabio Massacci, Chan Nam Ngo | An advanced course on modern crypto-based Financial Technology (currencies,​ virtual markets) and their foundations,​ in cooperation with INNOPAY NL|
  
  
teaching_activities.txt ยท Last modified: 2021/01/29 10:58 (external edit)