Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Explores the shift to secure communications through the biometric passport case study, covering RFID, identity examples, MRTD, EAC, and cryptographic protocols.
Explores ring signatures for anonymous feedback collection and introduces the ZK Attest protocol for secure signature verification using zero-knowledge proofs.