Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Man-in-the-middle attack
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (19)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 2
Next
TLS: Transport Layer Security
Explores the evolution and vulnerabilities of TLS, emphasizing the enhancements in TLS 1.3 and the role of certificate authorities.
RSA Encryption: Setup and Message Sending
Explains RSA encryption setup, message sending, and defense protocols against attacks.
Diffie-Hellman Cryptography: Key Exchange and Attacks
Explores Diffie-Hellman key exchange, DDH problem, active attacks, and cryptographic protocol challenges.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
Network Security: ARP Spoofing
Delves into routing in LAN, ARP spoofing attacks, and defense strategies against them, emphasizing the risks of network vulnerabilities.
Cybersecurity: Threat Modeling and Attack Strategies
Explores threat modeling, attack methods, and cybersecurity tools to enhance protection.
Network Security - Transport Layer Security
Discusses the limitations of TCP, the TLS Handshake, and the vulnerabilities in TLS protocols, emphasizing the importance of provable security in TLS 1.3.
Cryptography: General Framework
Explores the principles of cryptography, encryption, and information security, emphasizing confidentiality, integrity, and responsibility.
NFC Security Research with NFCGate
Explores NFC technology, NFCGate toolkit, security breaches, analysis tools, and counter-measures to enhance NFC security.