Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Physical security
Applied sciences
Computer engineering
Computer security
Access control
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 4
Next
Mandatory Access Control: Confidentiality Models
Explores the Bell La Padula model, covert channels, declassification challenges, and security properties in confidentiality models.
Protecting Work and EPFL
Emphasizes the importance of protecting work and EPFL through security measures and prevention strategies for safe web surfing.
Symmetry Operations in Quantum Mechanics
Explores symmetry operations in quantum mechanics, emphasizing the preservation of state properties.
EPFL Electronic Infrastructure Directive Revision
Discusses the revision of the EPFL Electronic Infrastructure Directive LEX 6.1.4 and its key changes.
ECDSA Ring Signature
Explores ring signatures for anonymous feedback collection and introduces the ZK Attest protocol for secure signature verification using zero-knowledge proofs.
General Information: Course Organization and Topic Selection
Covers course organization, topic selection, and presentation guidelines for various subjects.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Signal: Security Analysis
Explores the formal security analysis of the Signal Messaging Protocol, covering key concepts and highlighting limitations and results.
Introduction to Information Security: Threats and Defenses
Explores cybersecurity principles, threats, and defenses, emphasizing the importance of protecting digital information and systems.
Privacy Engineering: Projects & Ethics
Covers the organization of the course, projects, assessments, and ethics in privacy engineering.