| Date | Topic | Presenter | Jan 6 | Introduction | Urs Hengartner | 
| Jan 8 | Advice on giving Talks / Cryptography and Security I | Urs Hengartner | 
| Jan 11 | Paper choices are due | |
| Jan 13 | Research Overview / Cryptography and Security II | Urs Hengartner | 
| Jan 15 | Sample Projects / Cryptography and Security III | Urs Hengartner | 
| Jan 20 |  Location Privacy I Anonysense: Privacy-Aware People-Centric Sensing Chattering Laptops  |   Presenters removed for privacy reasons  | 
    
| Jan 22 |  Location Privacy II Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs Privacy: Theory meets Practice on the Map  | 
      
       | 
    
| Jan 27 |  Location Privacy III Private Queries in Location Based Services: Anonymizers are not Necessary Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring  | 
      
       | 
    
| Jan 29 | No lecture | |
| Feb 3 |  Trusted Computing Measuring Integrity on Mobile Phone Systems Trustworthy and Personalized Computing on Public Kiosks  | 
      
       | 
    
| Feb 5 |  Privacy I On the Existence of Unconditionally Privacy-Preserving Auction Protocols FlyByNight: Mitigating the Privacy Risks of Social Networking  | 
       | 
    
| Feb 10 |  Privacy II Privacy-Enhanced Sharing of Personal Content on the Web Towards Practical Privacy for Genomic Computation  | 
       | 
    
| Feb 12 |  Internet Security iTrustPage: A User-Assisted Anti-Phishing Tool Detecting In-Flight Page Changes with Web Tripwires  | 
      
       | 
    
| Feb 17 | Reading week | |
| Feb 19 | Reading week | |
| Feb 22 | Project proposals are due | |
| Feb 24 |  Web 2.0 / RFID Protection and Communication Abstractions for Web Browsers in MashupOS EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond  | 
       | 
    
| Feb 26 |  Attacks I Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations Cloaker: Hardware Supported Rootkit Concealment  | 
      
       | 
    
| Mar 3 |  Attacks II Lest We Remember: Cold Boot Attacks on Encryption Keys BootJacker: Compromising Computers using Forced Restarts  | 
      
       | 
    
| Mar 5 |  Usability I You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings  | 
      
       | 
| Mar 10 | No lecture | |
| Mar 12 | No lecture | |
| Mar 17 |  Usability II Analyzing Websites for User-Visible Security Design Flaws Exploring User Reactions to New Browser Cues for Extended Validation Certificates  | 
      
       | 
    
| Mar 19 |  Usability III Personal knowledge questions for fallback authentication: Security questions in the era of Facebook Use Your Illusion: Secure Authentication Usable Anywhere  | 
       | 
    Mar 24 |  Voting Civitas: Toward a Secure Voting System Helios: Web-based Open-Audit Voting  | 
      
       | 
 
  
| Mar 26 | Project presentations | 
        | 
    
| Mar 31 |  Security Economics Secure or Insure? A Game-Theoretic Analysis of Information Security Games Project presentations  | 
      
 | 
    
| Apr 2 | Project presentations | 
  | 
    
| Apr 20 (tentative) | Project write-ups are due |