Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Kerberos (protocol)
Applied sciences
Computer engineering
Computer security
Access control
Graph Chatbot
Related lectures (24)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 3
Next
Anonymous Tokens with Hidden Metadata Bit
Explores anonymous tokens with hidden metadata bit, addressing trust establishment challenges and security implications in client-server interactions.
Secure Multiparty Computation: Oblivious Transfer
Explores Oblivious Transfer in Secure Multiparty Computation, ensuring private input computation and secure function evaluation.
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
Presents BioLocker, a biometric authentication system using 3D finger vein recognition, covering principles, algorithms, security, and future work.
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Identity & Anonymity Technologies
Explores identity technologies, self-sovereign ID, federated systems, privacy mechanisms, and online services trust.
Diffie-Hellman and ElGamal Cryptosystems
Explores Diffie-Hellman key exchange, ElGamal cryptosystem, and their security applications in cryptography.
Network Security: Denial of Service
Explores Denial of Service attacks, prevention techniques, and various attack examples in network security.
Efficient Post-Quantum Commutative Group Action
Explores the CSIDH algorithm, a post-quantum cryptographic scheme based on isogenies, discussing its history, inner workings, and security.
Security Protocols and Applications: Introduction
Introduces a seminar where students present on various security topics and emphasizes the importance of correct cryptographic implementations.
Diffie-Hellman Key Exchange and ElGamal Cryptosystem
Explores Diffie-Hellman key exchange and ElGamal cryptosystem, discussing their security aspects and applications in RSA, emphasizing the Chinese Remainder Theorem's role in speeding up decryption and proving RSA correctness.