Computer System Security
sections' examples
JIF's labels
Yahalom Protocol
Permission hereby granted for anyone to copy, modify, and redistribute any lecture note material from this class that belongs to the instructor.