This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
teaching_activities [2019/03/13 16:49] fabio.massacci@unitn.it [Advanced and Eligible Courses] |
teaching_activities [2021/01/29 10:58] (current) |
||
---|---|---|---|
Line 46: | Line 46: | ||
^Title ^Credits ^Year ^Semester ^Lecturer ^Brief Info^ | ^Title ^Credits ^Year ^Semester ^Lecturer ^Brief Info^ | ||
- | |[[http://disi.unitn.it/~passerini/teaching/2016-2017/MachineLearning/|Machine Learning]]|6ECTS| 1,2 | 1 | Andrea Passerini | An introductory course in Machine Learning. SandP students will conclude the course with a project on Intrusion Detection. Recommended to those who wants to continue with Cyber Data Analytics in Twente.| | + | |[[http://disi.unitn.it/~passerini/teaching/2018-2019/MachineLearning/|Machine Learning]]|6ECTS| 1,2 | 1 | Andrea Passerini | An introductory course in Machine Learning. SandP students will conclude the course with a project on Intrusion Detection. Recommended to those who wants to continue with Cyber Data Analytics in Twente.| |
|{{https://www.esse3.unitn.it/Guide/StampaContenutiCorso.do?AD_ID=92750|Multimedia Data Security}}|6ECTS| 1,2 | 1 | Giulia Boato|This optional course is specifically devoted to DRM, digital watermarking and digital forensics. (You need to log in with UNITN credential to see the material)| | |{{https://www.esse3.unitn.it/Guide/StampaContenutiCorso.do?AD_ID=92750|Multimedia Data Security}}|6ECTS| 1,2 | 1 | Giulia Boato|This optional course is specifically devoted to DRM, digital watermarking and digital forensics. (You need to log in with UNITN credential to see the material)| | ||
|[[http://disi.unitn.it/~zunino/teaching/formalTechniques/|Formal Techniques for Crypto Protocol Analysis]]|6ECTS| 1,2 | 2 | Roberto Zunino | This optional course introduce formal methods for security using the Coq proof assistant.| | |[[http://disi.unitn.it/~zunino/teaching/formalTechniques/|Formal Techniques for Crypto Protocol Analysis]]|6ECTS| 1,2 | 2 | Roberto Zunino | This optional course introduce formal methods for security using the Coq proof assistant.| | ||
Line 52: | Line 52: | ||
|Finite Fields and Symmetric Cryptography|6ECTS| 1,2 | 2 | Massimiliano Sala | An advanced course on Cryptography (follow-up course on Cryptography)| | |Finite Fields and Symmetric Cryptography|6ECTS| 1,2 | 2 | Massimiliano Sala | An advanced course on Cryptography (follow-up course on Cryptography)| | ||
|[[http://cricca.disi.unitn.it/montresor/teaching/ds2/|Distributed Systems 2]]|6ECTS| 1,2 | 1 | Alberto Montresor | An advanced course on Distributed Systems (Byzantine Failures, blockchains)| | |[[http://cricca.disi.unitn.it/montresor/teaching/ds2/|Distributed Systems 2]]|6ECTS| 1,2 | 1 | Alberto Montresor | An advanced course on Distributed Systems (Byzantine Failures, blockchains)| | ||
- | |[[Complexity, Cryptography and Financial Technology]]|12ECTS| 2 | 1 | Fabio Massacci, Chan Nam Ngo | An advanced course on modern crypto-based Financial Technology (currencies, virtual markets) and their foundations, in cooperation with INNOPAY NL| | + | |[[Cryptography and Financial Technology]]|6ECTS| 2 | 1 | Fabio Massacci, Chan Nam Ngo | An advanced course on modern crypto-based Financial Technology (currencies, virtual markets) and their foundations, in cooperation with INNOPAY NL| |