Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Authentication protocol
Applied sciences
Computer engineering
Computer security
Authentication
Graph Chatbot
Related lectures (28)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 3
Next
Bluetooth Security Protocols
Explores Bluetooth security protocols, focusing on secure pairing and preventing active attacks.
Authentication: Basics
Covers the process of verifying identity, traditional methods like passwords, and modern approaches such as biometrics.
Network Security: IP Security
Covers IP basics, vulnerabilities like IP spoofing, and the use of IPSec for Virtual Private Networks.
Data Security: Hashing, Salting, and Password Storage
Emphasizes the significance of hashing, salting, and secure password storage in data security, highlighting the use of salt to prevent dictionary attacks and memory hard functions to slow down password cracking.
Authentication - Tokens
Covers the concept of tokens, how they work, and the implementation of two-factor authentication.
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
TLS: Transport Layer Security
Explores the evolution and vulnerabilities of TLS, emphasizing the enhancements in TLS 1.3 and the role of certificate authorities.
Authentication: Passwords
Covers the importance of passwords in authentication, including secure transfer, storage, and checking techniques.
Network Security: Desired Properties and Solutions
Discusses the importance of network security properties and solutions to enhance overall security.
Access Control: Password-based Cryptography
Explores access control and password-based cryptography, including challenges, biometrics, and the biometric passport case study.