1 | Lecture 01: The Model of Decentralization | PDF unavailable |
2 | Lecture 02: What is Blockchain | PDF unavailable |
3 | Lecture 03: Basic Cryptographic Primitives - I | PDF unavailable |
4 | Lecture 04: Basic Cryptographic Primitives - II | PDF unavailable |
5 | Lecture 05: Basic Cryptographic Primitives - III | PDF unavailable |
6 | Lectuere 06: Basic Cryptographic Primitives - IV | PDF unavailable |
7 | Lecture 07: Basic Cryptographic Primitives - V | PDF unavailable |
8 | Lecture 08: Distributed Systems for Decentralization – The Beginning | PDF unavailable |
9 | Lecture 09: The Evolution of Cryptocurrencies | PDF unavailable |
10 | Lecture 10: Open Consensus and Bitcoin | PDF unavailable |
11 | Lecture 11: Bitcoin Mining and Beyond | PDF unavailable |
12 | Lecture 12: Smart Contracts and the Permissioned Models of Blockchain" | PDF unavailable |
13 | Lecture 13: Blockchain Elements - I | PDF unavailable |
14 | Lecture 14: Blockchain Elements - II | PDF unavailable |
15 | Lecture 15: Blockchain Elements - III | PDF unavailable |
16 | Lecture 16: Blockchain Elements - IV | PDF unavailable |
17 | Lecture 17: Blockchain Elements - V | PDF unavailable |
18 | Lecture 18: Permissionless Model and Open Consensus | PDF unavailable |
19 | Lecture 19: Nakamoto Consensus (Proof of Work) | PDF unavailable |
20 | Lecture 20: Limitations of PoW: Forking and Security | PDF unavailable |
21 | Lecture 21: Beyond PoW | PDF unavailable |
22 | Lecture 22: Ethereum 1 | PDF unavailable |
23 | Lecture 23: Ethereum 2 | PDF unavailable |
24 | Lecture 24: Ethereum 3 | PDF unavailable |
25 | Lecture 25: Ethereum 4 | PDF unavailable |
26 | Lecture 26: Consensus for Permissioned Models | PDF unavailable |
27 | Lecture 27: State Machine Replication as Distributed Consensus | PDF unavailable |
28 | Lecture 28: Paxos | PDF unavailable |
29 | Lecture 29: Paxos – Safety and Liveness | PDF unavailable |
30 | Lecture 30: Byzantine Faults | PDF unavailable |
31 | Lecture 31: Byzantine Agreement Protocols | PDF unavailable |
32 | Lecture 32: Safety and Liveness of PBFT | PDF unavailable |
33 | Lecture 33: Enterprise Blockchains | PDF unavailable |
34 | Lecture 34: Hyperledger Fabric 1 | PDF unavailable |
35 | Lecture 35: Hyperledger Fabric 2 | PDF unavailable |
36 | Lecture 36: Hyperledger Fabric 3 | PDF unavailable |
37 | Lecture 37: Hyperledger Fabric 4 | PDF unavailable |
38 | Lecture 38: Consensus Scalability | PDF unavailable |
39 | Lecture 39: Bitcoin-NG | PDF unavailable |
40 | Lecture 40: Collective Signing (CoSi) | PDF unavailable |
41 | Lecture 41: ByzCoin | PDF unavailable |
42 | Lecture 42: Algorand | PDF unavailable |
43 | Lecture 43: Identity Management - I | PDF unavailable |
44 | Lecture 44: Identity Management - II | PDF unavailable |
45 | Lecture 45: Identity Management - III | PDF unavailable |
46 | Lecture 46: Blockchain Interoperability - I | PDF unavailable |
47 | Lecture 47: Blockchain Interoperability - II | PDF unavailable |
48 | Lecture 48: Blockchain Interoperability - III | PDF unavailable |
49 | Lecture 49: Hyperledger Indy I | PDF unavailable |
50 | Lecture 50: Hyperledger Indy II | PDF unavailable |
51 | Lecture 51: Hyperledger Aries | PDF unavailable |
52 | Lecture 52: Blockchain Security - I? | PDF unavailable |
53 | Lecture 53: Blockchain Security - II? | PDF unavailable |
54 | Lecture 54: Blockchain Security - III? | PDF unavailable |
55 | Lecture 55: Use Cases? | PDF unavailable |
56 | Lecture 56: A Potential Use Case – From a Critics Perspective | PDF unavailable |
57 | Lecture 57: Blockchain in Financial Services | PDF unavailable |
58 | Lecture 58: Public Sector Use Cases | PDF unavailable |
59 | Lecture 59: Blockchain for Decentralized Marketplace (Part 1) | PDF unavailable |
60 | Lecture 60: Blockchain for Decentralized Marketplace (Part 2) | PDF unavailable |