Covers the BB84 Quantum Key Distribution protocol for secure key establishment.
Covers security mechanisms, defense in depth, and methods to show systems are secure.
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Explores biometrics, tokens, authentication processes, and adversarial reasoning in security engineering.
Covers basic security concepts, adversarial thinking, security mechanisms, and responsible conduct in security design principles.
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
Explores symmetry operations in quantum mechanics, emphasizing the preservation of state properties.
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
Explores the Bell La Padula model, covert channels, declassification challenges, and security properties in confidentiality models.
Explores ring signatures for anonymous feedback collection and introduces the ZK Attest protocol for secure signature verification using zero-knowledge proofs.