Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Category
File sharing
Applied sciences
Computer engineering
Computer networks
File sharing
Graph Chatbot
Related lectures (31)
Previous
Page 1 of 4
Next
Anonymous communications: Crowds and Mix networks
Explores anonymous communications, the Crowds system, the predecessor attack, and Mix networks for sender/receiver anonymity.
Decentralized Systems: Distributed Storage and Eclipse Attacks
Explores decentralized systems, distributed storage, and Eclipse attacks in peer-to-peer networks, emphasizing security and consistency.
Distributed Storage Challenges
Explores challenges in distributed storage, covering organization, availability, scalability, and access control.
Anonymity Online: Techniques and Weaknesses
Explores online anonymity techniques and weaknesses, including bypassing geo-blocking and avoiding tracking.
Sybil Attacks and Defenses
Explores Sybil attacks, fake content creation, and defenses against online identity fraud.
Decentralized Systems Engineering: Chord DHT
Covers the Chord DHT in decentralized systems engineering, focusing on reliability, redundancy, and structure maintenance.
Ad-Hoc Networks: Routing and DHTs
Explores peer-to-peer networks, ad-hoc routing, and distributed hash tables.
Privacy Technologies: Some Privacy Technologies (part II)
Explores anonymous communication systems, attribute-based credentials, the Tor network, and other privacy technologies.
Anonymous Communications: Toolbox for Privacy Engineering
Covers the toolbox for privacy engineering, focusing on anonymous communications and the challenges with encryption and metadata encoding.
Censorship Resistance: Tor Bridges & ScrambleSuit
Explores Tor bridges enumeration, ScrambleSuit for censorship resistance, and mimicking whitelisted applications like Skype.