Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Key size
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (30)
Login to filter by course
Login to filter by course
Reset
Previous
Page 3 of 3
Next
Trust Establishment: Bluetooth Security
Explores trust establishment in Bluetooth security, covering protocols, vulnerabilities, countermeasures, and security features.
Public-Key Cryptography: Fundamentals and Applications
Explores public-key cryptography, covering key exchange, signature schemes, and real-world applications like the Signal protocol.
Symmetric-key Cryptosystems
Introduces symmetric-key cryptosystems and the key concepts for secure communication.
Cosmic Microwave Background: Observations and Implications
Explores the Cosmic Microwave Background, its anisotropies, and cosmological implications through observations and statistical assessments.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Molecular Mechanism of Chaperonin GroEL
Explores the molecular mechanism and client preference of chaperonin GroEL in protein folding and aggregation prevention.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Synchronization Inference
Explores automatic synthesis of correct and efficient synchronization in programs, focusing on removing redundant atomicity and adding synchronization metadata.
General Introduction: Governing Global Migration
Introduces the course on governing global migration, emphasizing engagement, flexibility, and key migration policy issues.
Network Security: IP Security
Covers IP basics, vulnerabilities like IP spoofing, and the use of IPSec for Virtual Private Networks.