Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Transport Layer Security
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 4
Next
Linear Algebra: Compositions of Applications
Explores compositions of applications and injectivity conditions in linear algebra, including restriction of applications and combinatorial proof of injections.
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
Trust Establishment: Bluetooth Security
Explores trust establishment in Bluetooth security, covering protocols, vulnerabilities, countermeasures, and security features.
Optimization Methods
Covers unconstrained and constrained optimization, optimal control, neural networks, and global optimization methods.
Raccoon Attack on TLS 1.2
Explores the Raccoon Attack, a timing attack on TLS-DH(E) that exploits most significant bit oracles.
SSL Certificates: Understanding and Python Implementation
Explores SSL certificates, their analysis in browsers and Python, and root certificate chain retrieval.
Numerical methods: runge-kutta
Covers the Runge-Kutta method and its variations, discussing error minimization and stability in non-linear systems.
SSL Certificates: Understanding and Python Implementation
Delves into SSL certificates, Python implementation, and root certificate chains.
TLS: Understanding Certificates and Python Implementation
Explores TLS certificates in web browsers and Python, covering verification, root and intermediate certificates, and Python code for analysis.
Structural Analysis: Bar Elements
Covers stiffness matrices, system assembly, constraints, reactions, and displacements in structural analysis.