Algorithm and Discrete Optimization: 2014-2015
		The lecture notes are not yet typo free and will remain in a highly dynamic and unstable state until the next lecture. Hence, a strong suggestion is to wait until the next lecture to retrieve the final version. Moreover, students are invited and strongly encouraged to suggest modifications or corrections.
- Notes on Dynamic Programming. PDF
 
Security Models: 2014-2015
	The course is divided into two parts:
- Security models in the computational setting.
 - Security models in the symbolic setting.